May 14 00:43:27.713741 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 14 00:43:27.713761 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Tue May 13 23:17:31 -00 2025 May 14 00:43:27.713768 kernel: efi: EFI v2.70 by EDK II May 14 00:43:27.713774 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 14 00:43:27.713779 kernel: random: crng init done May 14 00:43:27.713784 kernel: ACPI: Early table checksum verification disabled May 14 00:43:27.713790 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 14 00:43:27.713797 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 14 00:43:27.713802 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713808 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713813 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713818 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713824 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713829 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713837 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713842 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713860 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 14 00:43:27.713866 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 14 00:43:27.713871 kernel: NUMA: Failed to initialise from firmware May 14 00:43:27.713877 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:43:27.713883 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 14 00:43:27.713888 kernel: Zone ranges: May 14 00:43:27.713894 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:43:27.713901 kernel: DMA32 empty May 14 00:43:27.713907 kernel: Normal empty May 14 00:43:27.713912 kernel: Movable zone start for each node May 14 00:43:27.713918 kernel: Early memory node ranges May 14 00:43:27.713923 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 14 00:43:27.713929 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 14 00:43:27.713934 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 14 00:43:27.713940 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 14 00:43:27.713946 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 14 00:43:27.713951 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 14 00:43:27.713957 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 14 00:43:27.713962 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 14 00:43:27.713969 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 14 00:43:27.713975 kernel: psci: probing for conduit method from ACPI. May 14 00:43:27.713980 kernel: psci: PSCIv1.1 detected in firmware. May 14 00:43:27.713986 kernel: psci: Using standard PSCI v0.2 function IDs May 14 00:43:27.713991 kernel: psci: Trusted OS migration not required May 14 00:43:27.713999 kernel: psci: SMC Calling Convention v1.1 May 14 00:43:27.714005 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 14 00:43:27.714013 kernel: ACPI: SRAT not present May 14 00:43:27.714019 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 14 00:43:27.714025 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 14 00:43:27.714031 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 14 00:43:27.714037 kernel: Detected PIPT I-cache on CPU0 May 14 00:43:27.714043 kernel: CPU features: detected: GIC system register CPU interface May 14 00:43:27.714049 kernel: CPU features: detected: Hardware dirty bit management May 14 00:43:27.714059 kernel: CPU features: detected: Spectre-v4 May 14 00:43:27.714066 kernel: CPU features: detected: Spectre-BHB May 14 00:43:27.714074 kernel: CPU features: kernel page table isolation forced ON by KASLR May 14 00:43:27.714080 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 14 00:43:27.714086 kernel: CPU features: detected: ARM erratum 1418040 May 14 00:43:27.714092 kernel: CPU features: detected: SSBS not fully self-synchronizing May 14 00:43:27.714098 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 14 00:43:27.714104 kernel: Policy zone: DMA May 14 00:43:27.714111 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=412b3b42de04d7d5abb18ecf506be3ad2c72d6425f1b2391aa97d359e8bd9923 May 14 00:43:27.714117 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 14 00:43:27.714123 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 14 00:43:27.714129 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 14 00:43:27.714135 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 14 00:43:27.714143 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114948K reserved, 0K cma-reserved) May 14 00:43:27.714149 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 14 00:43:27.714155 kernel: trace event string verifier disabled May 14 00:43:27.714160 kernel: rcu: Preemptible hierarchical RCU implementation. May 14 00:43:27.714167 kernel: rcu: RCU event tracing is enabled. May 14 00:43:27.714173 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 14 00:43:27.714179 kernel: Trampoline variant of Tasks RCU enabled. May 14 00:43:27.714185 kernel: Tracing variant of Tasks RCU enabled. May 14 00:43:27.714191 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 14 00:43:27.714197 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 14 00:43:27.714203 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 14 00:43:27.714210 kernel: GICv3: 256 SPIs implemented May 14 00:43:27.714216 kernel: GICv3: 0 Extended SPIs implemented May 14 00:43:27.714226 kernel: GICv3: Distributor has no Range Selector support May 14 00:43:27.714232 kernel: Root IRQ handler: gic_handle_irq May 14 00:43:27.714238 kernel: GICv3: 16 PPIs implemented May 14 00:43:27.714246 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 14 00:43:27.714252 kernel: ACPI: SRAT not present May 14 00:43:27.714258 kernel: ITS [mem 0x08080000-0x0809ffff] May 14 00:43:27.714264 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 14 00:43:27.714271 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 14 00:43:27.714291 kernel: GICv3: using LPI property table @0x00000000400d0000 May 14 00:43:27.714307 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 14 00:43:27.714316 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:43:27.714322 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 14 00:43:27.714329 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 14 00:43:27.714335 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 14 00:43:27.714341 kernel: arm-pv: using stolen time PV May 14 00:43:27.714347 kernel: Console: colour dummy device 80x25 May 14 00:43:27.714353 kernel: ACPI: Core revision 20210730 May 14 00:43:27.714360 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 14 00:43:27.714367 kernel: pid_max: default: 32768 minimum: 301 May 14 00:43:27.714373 kernel: LSM: Security Framework initializing May 14 00:43:27.714380 kernel: SELinux: Initializing. May 14 00:43:27.714387 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 14 00:43:27.714393 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 14 00:43:27.714400 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 14 00:43:27.714407 kernel: rcu: Hierarchical SRCU implementation. May 14 00:43:27.714413 kernel: Platform MSI: ITS@0x8080000 domain created May 14 00:43:27.714419 kernel: PCI/MSI: ITS@0x8080000 domain created May 14 00:43:27.714425 kernel: Remapping and enabling EFI services. May 14 00:43:27.714431 kernel: smp: Bringing up secondary CPUs ... May 14 00:43:27.714438 kernel: Detected PIPT I-cache on CPU1 May 14 00:43:27.714445 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 14 00:43:27.714451 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 14 00:43:27.714457 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:43:27.714463 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 14 00:43:27.714470 kernel: Detected PIPT I-cache on CPU2 May 14 00:43:27.714476 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 14 00:43:27.714482 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 14 00:43:27.714488 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:43:27.714494 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 14 00:43:27.714502 kernel: Detected PIPT I-cache on CPU3 May 14 00:43:27.714508 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 14 00:43:27.714514 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 14 00:43:27.714520 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 14 00:43:27.714531 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 14 00:43:27.714538 kernel: smp: Brought up 1 node, 4 CPUs May 14 00:43:27.714544 kernel: SMP: Total of 4 processors activated. May 14 00:43:27.714551 kernel: CPU features: detected: 32-bit EL0 Support May 14 00:43:27.714557 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 14 00:43:27.714564 kernel: CPU features: detected: Common not Private translations May 14 00:43:27.714570 kernel: CPU features: detected: CRC32 instructions May 14 00:43:27.714577 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 14 00:43:27.714584 kernel: CPU features: detected: LSE atomic instructions May 14 00:43:27.714591 kernel: CPU features: detected: Privileged Access Never May 14 00:43:27.714597 kernel: CPU features: detected: RAS Extension Support May 14 00:43:27.714604 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 14 00:43:27.714611 kernel: CPU: All CPU(s) started at EL1 May 14 00:43:27.714618 kernel: alternatives: patching kernel code May 14 00:43:27.714625 kernel: devtmpfs: initialized May 14 00:43:27.714631 kernel: KASLR enabled May 14 00:43:27.714638 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 14 00:43:27.714644 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 14 00:43:27.714651 kernel: pinctrl core: initialized pinctrl subsystem May 14 00:43:27.714657 kernel: SMBIOS 3.0.0 present. May 14 00:43:27.714664 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 14 00:43:27.714670 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 14 00:43:27.714678 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 14 00:43:27.714685 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 14 00:43:27.714691 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 14 00:43:27.714698 kernel: audit: initializing netlink subsys (disabled) May 14 00:43:27.714705 kernel: audit: type=2000 audit(0.032:1): state=initialized audit_enabled=0 res=1 May 14 00:43:27.714711 kernel: thermal_sys: Registered thermal governor 'step_wise' May 14 00:43:27.714718 kernel: cpuidle: using governor menu May 14 00:43:27.714724 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 14 00:43:27.714730 kernel: ASID allocator initialised with 32768 entries May 14 00:43:27.714738 kernel: ACPI: bus type PCI registered May 14 00:43:27.714745 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 14 00:43:27.714751 kernel: Serial: AMBA PL011 UART driver May 14 00:43:27.714758 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 14 00:43:27.714764 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 14 00:43:27.714771 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 14 00:43:27.714777 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 14 00:43:27.714784 kernel: cryptd: max_cpu_qlen set to 1000 May 14 00:43:27.714790 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 14 00:43:27.714798 kernel: ACPI: Added _OSI(Module Device) May 14 00:43:27.714805 kernel: ACPI: Added _OSI(Processor Device) May 14 00:43:27.714811 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 14 00:43:27.714817 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 14 00:43:27.714824 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 14 00:43:27.714830 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 14 00:43:27.714837 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 14 00:43:27.714843 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 14 00:43:27.714861 kernel: ACPI: Interpreter enabled May 14 00:43:27.714869 kernel: ACPI: Using GIC for interrupt routing May 14 00:43:27.714875 kernel: ACPI: MCFG table detected, 1 entries May 14 00:43:27.714882 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 14 00:43:27.714888 kernel: printk: console [ttyAMA0] enabled May 14 00:43:27.714895 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 14 00:43:27.715013 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 14 00:43:27.715084 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 14 00:43:27.715147 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 14 00:43:27.715205 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 14 00:43:27.715261 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 14 00:43:27.715270 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 14 00:43:27.715277 kernel: PCI host bridge to bus 0000:00 May 14 00:43:27.715348 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 14 00:43:27.715401 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 14 00:43:27.715454 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 14 00:43:27.715511 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 14 00:43:27.715625 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 14 00:43:27.715714 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 14 00:43:27.715776 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 14 00:43:27.715835 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 14 00:43:27.715913 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 14 00:43:27.715977 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 14 00:43:27.716036 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 14 00:43:27.716102 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 14 00:43:27.716157 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 14 00:43:27.716213 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 14 00:43:27.716265 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 14 00:43:27.716274 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 14 00:43:27.716307 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 14 00:43:27.716318 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 14 00:43:27.716325 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 14 00:43:27.716331 kernel: iommu: Default domain type: Translated May 14 00:43:27.716338 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 14 00:43:27.716345 kernel: vgaarb: loaded May 14 00:43:27.716351 kernel: pps_core: LinuxPPS API ver. 1 registered May 14 00:43:27.716358 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 14 00:43:27.716364 kernel: PTP clock support registered May 14 00:43:27.716371 kernel: Registered efivars operations May 14 00:43:27.716379 kernel: clocksource: Switched to clocksource arch_sys_counter May 14 00:43:27.716385 kernel: VFS: Disk quotas dquot_6.6.0 May 14 00:43:27.716392 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 14 00:43:27.716399 kernel: pnp: PnP ACPI init May 14 00:43:27.716471 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 14 00:43:27.716481 kernel: pnp: PnP ACPI: found 1 devices May 14 00:43:27.716487 kernel: NET: Registered PF_INET protocol family May 14 00:43:27.716494 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 14 00:43:27.716502 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 14 00:43:27.716509 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 14 00:43:27.716515 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 14 00:43:27.716522 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 14 00:43:27.716528 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 14 00:43:27.716535 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 14 00:43:27.716542 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 14 00:43:27.716548 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 14 00:43:27.716555 kernel: PCI: CLS 0 bytes, default 64 May 14 00:43:27.716562 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 14 00:43:27.716569 kernel: kvm [1]: HYP mode not available May 14 00:43:27.716575 kernel: Initialise system trusted keyrings May 14 00:43:27.716582 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 14 00:43:27.716588 kernel: Key type asymmetric registered May 14 00:43:27.716595 kernel: Asymmetric key parser 'x509' registered May 14 00:43:27.716601 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 14 00:43:27.716608 kernel: io scheduler mq-deadline registered May 14 00:43:27.716615 kernel: io scheduler kyber registered May 14 00:43:27.716622 kernel: io scheduler bfq registered May 14 00:43:27.716629 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 14 00:43:27.716635 kernel: ACPI: button: Power Button [PWRB] May 14 00:43:27.716642 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 14 00:43:27.716703 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 14 00:43:27.716712 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 14 00:43:27.716719 kernel: thunder_xcv, ver 1.0 May 14 00:43:27.716725 kernel: thunder_bgx, ver 1.0 May 14 00:43:27.716732 kernel: nicpf, ver 1.0 May 14 00:43:27.716739 kernel: nicvf, ver 1.0 May 14 00:43:27.716811 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 14 00:43:27.716917 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-14T00:43:27 UTC (1747183407) May 14 00:43:27.716928 kernel: hid: raw HID events driver (C) Jiri Kosina May 14 00:43:27.716935 kernel: NET: Registered PF_INET6 protocol family May 14 00:43:27.716942 kernel: Segment Routing with IPv6 May 14 00:43:27.716948 kernel: In-situ OAM (IOAM) with IPv6 May 14 00:43:27.716955 kernel: NET: Registered PF_PACKET protocol family May 14 00:43:27.716964 kernel: Key type dns_resolver registered May 14 00:43:27.716971 kernel: registered taskstats version 1 May 14 00:43:27.716977 kernel: Loading compiled-in X.509 certificates May 14 00:43:27.716984 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 7727f4e7680a5b8534f3d5e7bb84b1f695e8c34b' May 14 00:43:27.716990 kernel: Key type .fscrypt registered May 14 00:43:27.716997 kernel: Key type fscrypt-provisioning registered May 14 00:43:27.717003 kernel: ima: No TPM chip found, activating TPM-bypass! May 14 00:43:27.717010 kernel: ima: Allocated hash algorithm: sha1 May 14 00:43:27.717016 kernel: ima: No architecture policies found May 14 00:43:27.717024 kernel: clk: Disabling unused clocks May 14 00:43:27.717031 kernel: Freeing unused kernel memory: 36480K May 14 00:43:27.717037 kernel: Run /init as init process May 14 00:43:27.717043 kernel: with arguments: May 14 00:43:27.717050 kernel: /init May 14 00:43:27.717063 kernel: with environment: May 14 00:43:27.717070 kernel: HOME=/ May 14 00:43:27.717076 kernel: TERM=linux May 14 00:43:27.717082 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 14 00:43:27.717093 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 14 00:43:27.717102 systemd[1]: Detected virtualization kvm. May 14 00:43:27.717109 systemd[1]: Detected architecture arm64. May 14 00:43:27.717116 systemd[1]: Running in initrd. May 14 00:43:27.717122 systemd[1]: No hostname configured, using default hostname. May 14 00:43:27.717129 systemd[1]: Hostname set to . May 14 00:43:27.717136 systemd[1]: Initializing machine ID from VM UUID. May 14 00:43:27.717145 systemd[1]: Queued start job for default target initrd.target. May 14 00:43:27.717152 systemd[1]: Started systemd-ask-password-console.path. May 14 00:43:27.717158 systemd[1]: Reached target cryptsetup.target. May 14 00:43:27.717165 systemd[1]: Reached target paths.target. May 14 00:43:27.717172 systemd[1]: Reached target slices.target. May 14 00:43:27.717179 systemd[1]: Reached target swap.target. May 14 00:43:27.717186 systemd[1]: Reached target timers.target. May 14 00:43:27.717193 systemd[1]: Listening on iscsid.socket. May 14 00:43:27.717201 systemd[1]: Listening on iscsiuio.socket. May 14 00:43:27.717208 systemd[1]: Listening on systemd-journald-audit.socket. May 14 00:43:27.717215 systemd[1]: Listening on systemd-journald-dev-log.socket. May 14 00:43:27.717222 systemd[1]: Listening on systemd-journald.socket. May 14 00:43:27.717229 systemd[1]: Listening on systemd-networkd.socket. May 14 00:43:27.717236 systemd[1]: Listening on systemd-udevd-control.socket. May 14 00:43:27.717243 systemd[1]: Listening on systemd-udevd-kernel.socket. May 14 00:43:27.717250 systemd[1]: Reached target sockets.target. May 14 00:43:27.717258 systemd[1]: Starting kmod-static-nodes.service... May 14 00:43:27.717265 systemd[1]: Finished network-cleanup.service. May 14 00:43:27.717272 systemd[1]: Starting systemd-fsck-usr.service... May 14 00:43:27.717279 systemd[1]: Starting systemd-journald.service... May 14 00:43:27.717286 systemd[1]: Starting systemd-modules-load.service... May 14 00:43:27.717293 systemd[1]: Starting systemd-resolved.service... May 14 00:43:27.717300 systemd[1]: Starting systemd-vconsole-setup.service... May 14 00:43:27.717307 systemd[1]: Finished kmod-static-nodes.service. May 14 00:43:27.717314 systemd[1]: Finished systemd-fsck-usr.service. May 14 00:43:27.717322 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 14 00:43:27.717329 systemd[1]: Finished systemd-vconsole-setup.service. May 14 00:43:27.717336 systemd[1]: Starting dracut-cmdline-ask.service... May 14 00:43:27.717343 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 14 00:43:27.717350 kernel: audit: type=1130 audit(1747183407.716:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.717360 systemd-journald[289]: Journal started May 14 00:43:27.717404 systemd-journald[289]: Runtime Journal (/run/log/journal/05a2b5ec88d14e0abf5549c15eba62dc) is 6.0M, max 48.7M, 42.6M free. May 14 00:43:27.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.710529 systemd-modules-load[290]: Inserted module 'overlay' May 14 00:43:27.719998 systemd[1]: Started systemd-journald.service. May 14 00:43:27.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.722231 kernel: audit: type=1130 audit(1747183407.719:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.729864 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 14 00:43:27.731526 systemd-resolved[291]: Positive Trust Anchors: May 14 00:43:27.731541 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 14 00:43:27.731569 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 14 00:43:27.737398 kernel: Bridge firewalling registered May 14 00:43:27.733665 systemd-modules-load[290]: Inserted module 'br_netfilter' May 14 00:43:27.740918 kernel: audit: type=1130 audit(1747183407.737:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.735720 systemd-resolved[291]: Defaulting to hostname 'linux'. May 14 00:43:27.736461 systemd[1]: Started systemd-resolved.service. May 14 00:43:27.738209 systemd[1]: Reached target nss-lookup.target. May 14 00:43:27.743893 systemd[1]: Finished dracut-cmdline-ask.service. May 14 00:43:27.746933 kernel: audit: type=1130 audit(1747183407.743:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.745496 systemd[1]: Starting dracut-cmdline.service... May 14 00:43:27.748878 kernel: SCSI subsystem initialized May 14 00:43:27.754219 dracut-cmdline[308]: dracut-dracut-053 May 14 00:43:27.756974 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 14 00:43:27.756993 kernel: device-mapper: uevent: version 1.0.3 May 14 00:43:27.757002 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 14 00:43:27.757792 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=412b3b42de04d7d5abb18ecf506be3ad2c72d6425f1b2391aa97d359e8bd9923 May 14 00:43:27.762252 systemd-modules-load[290]: Inserted module 'dm_multipath' May 14 00:43:27.763032 systemd[1]: Finished systemd-modules-load.service. May 14 00:43:27.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.764537 systemd[1]: Starting systemd-sysctl.service... May 14 00:43:27.767707 kernel: audit: type=1130 audit(1747183407.762:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.772592 systemd[1]: Finished systemd-sysctl.service. May 14 00:43:27.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.775876 kernel: audit: type=1130 audit(1747183407.772:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.828868 kernel: Loading iSCSI transport class v2.0-870. May 14 00:43:27.844873 kernel: iscsi: registered transport (tcp) May 14 00:43:27.859865 kernel: iscsi: registered transport (qla4xxx) May 14 00:43:27.859885 kernel: QLogic iSCSI HBA Driver May 14 00:43:27.897726 systemd[1]: Finished dracut-cmdline.service. May 14 00:43:27.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.899528 systemd[1]: Starting dracut-pre-udev.service... May 14 00:43:27.902578 kernel: audit: type=1130 audit(1747183407.898:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:27.945867 kernel: raid6: neonx8 gen() 13728 MB/s May 14 00:43:27.962867 kernel: raid6: neonx8 xor() 10753 MB/s May 14 00:43:27.979860 kernel: raid6: neonx4 gen() 13456 MB/s May 14 00:43:27.996857 kernel: raid6: neonx4 xor() 11128 MB/s May 14 00:43:28.013857 kernel: raid6: neonx2 gen() 12849 MB/s May 14 00:43:28.030865 kernel: raid6: neonx2 xor() 10237 MB/s May 14 00:43:28.047871 kernel: raid6: neonx1 gen() 10526 MB/s May 14 00:43:28.064869 kernel: raid6: neonx1 xor() 8772 MB/s May 14 00:43:28.081869 kernel: raid6: int64x8 gen() 6273 MB/s May 14 00:43:28.098870 kernel: raid6: int64x8 xor() 3540 MB/s May 14 00:43:28.115869 kernel: raid6: int64x4 gen() 7218 MB/s May 14 00:43:28.132869 kernel: raid6: int64x4 xor() 3852 MB/s May 14 00:43:28.149869 kernel: raid6: int64x2 gen() 6150 MB/s May 14 00:43:28.166869 kernel: raid6: int64x2 xor() 3321 MB/s May 14 00:43:28.183860 kernel: raid6: int64x1 gen() 5047 MB/s May 14 00:43:28.201063 kernel: raid6: int64x1 xor() 2646 MB/s May 14 00:43:28.201083 kernel: raid6: using algorithm neonx8 gen() 13728 MB/s May 14 00:43:28.201099 kernel: raid6: .... xor() 10753 MB/s, rmw enabled May 14 00:43:28.201119 kernel: raid6: using neon recovery algorithm May 14 00:43:28.211995 kernel: xor: measuring software checksum speed May 14 00:43:28.212025 kernel: 8regs : 16722 MB/sec May 14 00:43:28.212042 kernel: 32regs : 20733 MB/sec May 14 00:43:28.212901 kernel: arm64_neon : 27132 MB/sec May 14 00:43:28.212914 kernel: xor: using function: arm64_neon (27132 MB/sec) May 14 00:43:28.265870 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 14 00:43:28.275739 systemd[1]: Finished dracut-pre-udev.service. May 14 00:43:28.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:28.281180 kernel: audit: type=1130 audit(1747183408.275:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:28.281205 kernel: audit: type=1334 audit(1747183408.278:10): prog-id=7 op=LOAD May 14 00:43:28.278000 audit: BPF prog-id=7 op=LOAD May 14 00:43:28.278000 audit: BPF prog-id=8 op=LOAD May 14 00:43:28.279675 systemd[1]: Starting systemd-udevd.service... May 14 00:43:28.294988 systemd-udevd[490]: Using default interface naming scheme 'v252'. May 14 00:43:28.298317 systemd[1]: Started systemd-udevd.service. May 14 00:43:28.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:28.301246 systemd[1]: Starting dracut-pre-trigger.service... May 14 00:43:28.312438 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation May 14 00:43:28.338835 systemd[1]: Finished dracut-pre-trigger.service. May 14 00:43:28.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:28.340185 systemd[1]: Starting systemd-udev-trigger.service... May 14 00:43:28.383089 systemd[1]: Finished systemd-udev-trigger.service. May 14 00:43:28.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:28.411870 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 14 00:43:28.415239 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 14 00:43:28.415259 kernel: GPT:9289727 != 19775487 May 14 00:43:28.415269 kernel: GPT:Alternate GPT header not at the end of the disk. May 14 00:43:28.415277 kernel: GPT:9289727 != 19775487 May 14 00:43:28.415286 kernel: GPT: Use GNU Parted to correct GPT errors. May 14 00:43:28.415294 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:43:28.426874 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (542) May 14 00:43:28.427989 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 14 00:43:28.433044 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 14 00:43:28.433776 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 14 00:43:28.439737 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 14 00:43:28.444736 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 14 00:43:28.446187 systemd[1]: Starting disk-uuid.service... May 14 00:43:28.451647 disk-uuid[565]: Primary Header is updated. May 14 00:43:28.451647 disk-uuid[565]: Secondary Entries is updated. May 14 00:43:28.451647 disk-uuid[565]: Secondary Header is updated. May 14 00:43:28.454856 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:43:29.465222 disk-uuid[566]: The operation has completed successfully. May 14 00:43:29.466816 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 14 00:43:29.496511 systemd[1]: disk-uuid.service: Deactivated successfully. May 14 00:43:29.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.496605 systemd[1]: Finished disk-uuid.service. May 14 00:43:29.497993 systemd[1]: Starting verity-setup.service... May 14 00:43:29.512868 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 14 00:43:29.538028 systemd[1]: Found device dev-mapper-usr.device. May 14 00:43:29.539335 systemd[1]: Mounting sysusr-usr.mount... May 14 00:43:29.543184 systemd[1]: Finished verity-setup.service. May 14 00:43:29.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.585688 systemd[1]: Mounted sysusr-usr.mount. May 14 00:43:29.586842 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 14 00:43:29.586346 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 14 00:43:29.586955 systemd[1]: Starting ignition-setup.service... May 14 00:43:29.589163 systemd[1]: Starting parse-ip-for-networkd.service... May 14 00:43:29.594439 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 14 00:43:29.594474 kernel: BTRFS info (device vda6): using free space tree May 14 00:43:29.594483 kernel: BTRFS info (device vda6): has skinny extents May 14 00:43:29.602315 systemd[1]: mnt-oem.mount: Deactivated successfully. May 14 00:43:29.608713 systemd[1]: Finished ignition-setup.service. May 14 00:43:29.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.610024 systemd[1]: Starting ignition-fetch-offline.service... May 14 00:43:29.668766 systemd[1]: Finished parse-ip-for-networkd.service. May 14 00:43:29.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.669000 audit: BPF prog-id=9 op=LOAD May 14 00:43:29.670832 systemd[1]: Starting systemd-networkd.service... May 14 00:43:29.686977 ignition[651]: Ignition 2.14.0 May 14 00:43:29.686986 ignition[651]: Stage: fetch-offline May 14 00:43:29.687025 ignition[651]: no configs at "/usr/lib/ignition/base.d" May 14 00:43:29.687034 ignition[651]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:43:29.687186 ignition[651]: parsed url from cmdline: "" May 14 00:43:29.687189 ignition[651]: no config URL provided May 14 00:43:29.687193 ignition[651]: reading system config file "/usr/lib/ignition/user.ign" May 14 00:43:29.687200 ignition[651]: no config at "/usr/lib/ignition/user.ign" May 14 00:43:29.687217 ignition[651]: op(1): [started] loading QEMU firmware config module May 14 00:43:29.687224 ignition[651]: op(1): executing: "modprobe" "qemu_fw_cfg" May 14 00:43:29.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.694916 ignition[651]: op(1): [finished] loading QEMU firmware config module May 14 00:43:29.695412 systemd-networkd[743]: lo: Link UP May 14 00:43:29.695415 systemd-networkd[743]: lo: Gained carrier May 14 00:43:29.695748 systemd-networkd[743]: Enumeration completed May 14 00:43:29.695821 systemd[1]: Started systemd-networkd.service. May 14 00:43:29.696815 systemd[1]: Reached target network.target. May 14 00:43:29.698296 systemd[1]: Starting iscsiuio.service... May 14 00:43:29.699268 systemd-networkd[743]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 14 00:43:29.700208 systemd-networkd[743]: eth0: Link UP May 14 00:43:29.700213 systemd-networkd[743]: eth0: Gained carrier May 14 00:43:29.709186 systemd[1]: Started iscsiuio.service. May 14 00:43:29.711077 systemd[1]: Starting iscsid.service... May 14 00:43:29.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.714502 iscsid[750]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 14 00:43:29.714502 iscsid[750]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 14 00:43:29.714502 iscsid[750]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 14 00:43:29.714502 iscsid[750]: If using hardware iscsi like qla4xxx this message can be ignored. May 14 00:43:29.714502 iscsid[750]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 14 00:43:29.714502 iscsid[750]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 14 00:43:29.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.717483 systemd[1]: Started iscsid.service. May 14 00:43:29.721510 systemd[1]: Starting dracut-initqueue.service... May 14 00:43:29.722923 systemd-networkd[743]: eth0: DHCPv4 address 10.0.0.73/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 14 00:43:29.731071 systemd[1]: Finished dracut-initqueue.service. May 14 00:43:29.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.732082 systemd[1]: Reached target remote-fs-pre.target. May 14 00:43:29.733478 systemd[1]: Reached target remote-cryptsetup.target. May 14 00:43:29.734991 systemd[1]: Reached target remote-fs.target. May 14 00:43:29.737195 systemd[1]: Starting dracut-pre-mount.service... May 14 00:43:29.744285 systemd[1]: Finished dracut-pre-mount.service. May 14 00:43:29.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.759146 ignition[651]: parsing config with SHA512: f9cae6db7ce26db15a25ccac17f00e0e95938d9d30ce3741b950b4bb5d65b29f70c485f500d8f6210a1953632b8d28609c51542e36195c4e0e48b54f5be43d4d May 14 00:43:29.765545 unknown[651]: fetched base config from "system" May 14 00:43:29.765556 unknown[651]: fetched user config from "qemu" May 14 00:43:29.765984 ignition[651]: fetch-offline: fetch-offline passed May 14 00:43:29.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.767055 systemd[1]: Finished ignition-fetch-offline.service. May 14 00:43:29.766035 ignition[651]: Ignition finished successfully May 14 00:43:29.768425 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 14 00:43:29.769083 systemd[1]: Starting ignition-kargs.service... May 14 00:43:29.777436 ignition[764]: Ignition 2.14.0 May 14 00:43:29.777444 ignition[764]: Stage: kargs May 14 00:43:29.777529 ignition[764]: no configs at "/usr/lib/ignition/base.d" May 14 00:43:29.777538 ignition[764]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:43:29.778389 ignition[764]: kargs: kargs passed May 14 00:43:29.779932 systemd[1]: Finished ignition-kargs.service. May 14 00:43:29.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.778425 ignition[764]: Ignition finished successfully May 14 00:43:29.781612 systemd[1]: Starting ignition-disks.service... May 14 00:43:29.787495 ignition[771]: Ignition 2.14.0 May 14 00:43:29.787509 ignition[771]: Stage: disks May 14 00:43:29.787585 ignition[771]: no configs at "/usr/lib/ignition/base.d" May 14 00:43:29.787594 ignition[771]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:43:29.789830 systemd[1]: Finished ignition-disks.service. May 14 00:43:29.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.788731 ignition[771]: disks: disks passed May 14 00:43:29.791335 systemd[1]: Reached target initrd-root-device.target. May 14 00:43:29.788772 ignition[771]: Ignition finished successfully May 14 00:43:29.792487 systemd[1]: Reached target local-fs-pre.target. May 14 00:43:29.793616 systemd[1]: Reached target local-fs.target. May 14 00:43:29.794774 systemd[1]: Reached target sysinit.target. May 14 00:43:29.795898 systemd[1]: Reached target basic.target. May 14 00:43:29.797750 systemd[1]: Starting systemd-fsck-root.service... May 14 00:43:29.807806 systemd-fsck[779]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 14 00:43:29.811327 systemd[1]: Finished systemd-fsck-root.service. May 14 00:43:29.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.814327 systemd[1]: Mounting sysroot.mount... May 14 00:43:29.820883 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 14 00:43:29.820635 systemd[1]: Mounted sysroot.mount. May 14 00:43:29.821210 systemd[1]: Reached target initrd-root-fs.target. May 14 00:43:29.823173 systemd[1]: Mounting sysroot-usr.mount... May 14 00:43:29.823870 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 14 00:43:29.823904 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 14 00:43:29.823927 systemd[1]: Reached target ignition-diskful.target. May 14 00:43:29.825628 systemd[1]: Mounted sysroot-usr.mount. May 14 00:43:29.827156 systemd[1]: Starting initrd-setup-root.service... May 14 00:43:29.831092 initrd-setup-root[789]: cut: /sysroot/etc/passwd: No such file or directory May 14 00:43:29.834431 initrd-setup-root[797]: cut: /sysroot/etc/group: No such file or directory May 14 00:43:29.838424 initrd-setup-root[805]: cut: /sysroot/etc/shadow: No such file or directory May 14 00:43:29.842112 initrd-setup-root[813]: cut: /sysroot/etc/gshadow: No such file or directory May 14 00:43:29.865647 systemd[1]: Finished initrd-setup-root.service. May 14 00:43:29.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.866921 systemd[1]: Starting ignition-mount.service... May 14 00:43:29.868011 systemd[1]: Starting sysroot-boot.service... May 14 00:43:29.872049 bash[830]: umount: /sysroot/usr/share/oem: not mounted. May 14 00:43:29.880309 ignition[832]: INFO : Ignition 2.14.0 May 14 00:43:29.880309 ignition[832]: INFO : Stage: mount May 14 00:43:29.881783 ignition[832]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:43:29.881783 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:43:29.881783 ignition[832]: INFO : mount: mount passed May 14 00:43:29.881783 ignition[832]: INFO : Ignition finished successfully May 14 00:43:29.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:29.882881 systemd[1]: Finished ignition-mount.service. May 14 00:43:29.887050 systemd[1]: Finished sysroot-boot.service. May 14 00:43:29.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:30.548529 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 14 00:43:30.555378 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (840) May 14 00:43:30.555407 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 14 00:43:30.555416 kernel: BTRFS info (device vda6): using free space tree May 14 00:43:30.556352 kernel: BTRFS info (device vda6): has skinny extents May 14 00:43:30.559231 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 14 00:43:30.560573 systemd[1]: Starting ignition-files.service... May 14 00:43:30.574873 ignition[860]: INFO : Ignition 2.14.0 May 14 00:43:30.574873 ignition[860]: INFO : Stage: files May 14 00:43:30.576615 ignition[860]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:43:30.576615 ignition[860]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:43:30.576615 ignition[860]: DEBUG : files: compiled without relabeling support, skipping May 14 00:43:30.580204 ignition[860]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 14 00:43:30.580204 ignition[860]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 14 00:43:30.584383 ignition[860]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 14 00:43:30.585801 ignition[860]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 14 00:43:30.585801 ignition[860]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 14 00:43:30.585801 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 14 00:43:30.585801 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 14 00:43:30.585084 unknown[860]: wrote ssh authorized keys file for user: core May 14 00:43:30.627281 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 14 00:43:30.831070 systemd-networkd[743]: eth0: Gained IPv6LL May 14 00:43:30.876864 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 14 00:43:30.878499 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 May 14 00:43:31.348652 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 14 00:43:31.995360 ignition[860]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" May 14 00:43:31.997106 ignition[860]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" May 14 00:43:31.998121 ignition[860]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" May 14 00:43:32.025988 ignition[860]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 14 00:43:32.027060 ignition[860]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" May 14 00:43:32.027060 ignition[860]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" May 14 00:43:32.027060 ignition[860]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" May 14 00:43:32.027060 ignition[860]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 14 00:43:32.027060 ignition[860]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 14 00:43:32.027060 ignition[860]: INFO : files: files passed May 14 00:43:32.027060 ignition[860]: INFO : Ignition finished successfully May 14 00:43:32.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.028529 systemd[1]: Finished ignition-files.service. May 14 00:43:32.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.030009 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 14 00:43:32.039485 initrd-setup-root-after-ignition[885]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 14 00:43:32.031511 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 14 00:43:32.042258 initrd-setup-root-after-ignition[888]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 14 00:43:32.032161 systemd[1]: Starting ignition-quench.service... May 14 00:43:32.035347 systemd[1]: ignition-quench.service: Deactivated successfully. May 14 00:43:32.035430 systemd[1]: Finished ignition-quench.service. May 14 00:43:32.036780 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 14 00:43:32.037796 systemd[1]: Reached target ignition-complete.target. May 14 00:43:32.039422 systemd[1]: Starting initrd-parse-etc.service... May 14 00:43:32.052093 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 14 00:43:32.052183 systemd[1]: Finished initrd-parse-etc.service. May 14 00:43:32.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.053540 systemd[1]: Reached target initrd-fs.target. May 14 00:43:32.054482 systemd[1]: Reached target initrd.target. May 14 00:43:32.055454 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 14 00:43:32.056170 systemd[1]: Starting dracut-pre-pivot.service... May 14 00:43:32.066215 systemd[1]: Finished dracut-pre-pivot.service. May 14 00:43:32.069582 kernel: kauditd_printk_skb: 28 callbacks suppressed May 14 00:43:32.069608 kernel: audit: type=1130 audit(1747183412.065:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.067520 systemd[1]: Starting initrd-cleanup.service... May 14 00:43:32.075501 systemd[1]: Stopped target nss-lookup.target. May 14 00:43:32.076898 systemd[1]: Stopped target remote-cryptsetup.target. May 14 00:43:32.078335 systemd[1]: Stopped target timers.target. May 14 00:43:32.079718 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 14 00:43:32.079836 systemd[1]: Stopped dracut-pre-pivot.service. May 14 00:43:32.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.081396 systemd[1]: Stopped target initrd.target. May 14 00:43:32.084502 kernel: audit: type=1131 audit(1747183412.080:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.084160 systemd[1]: Stopped target basic.target. May 14 00:43:32.085267 systemd[1]: Stopped target ignition-complete.target. May 14 00:43:32.086455 systemd[1]: Stopped target ignition-diskful.target. May 14 00:43:32.087749 systemd[1]: Stopped target initrd-root-device.target. May 14 00:43:32.089057 systemd[1]: Stopped target remote-fs.target. May 14 00:43:32.090280 systemd[1]: Stopped target remote-fs-pre.target. May 14 00:43:32.091468 systemd[1]: Stopped target sysinit.target. May 14 00:43:32.092665 systemd[1]: Stopped target local-fs.target. May 14 00:43:32.093798 systemd[1]: Stopped target local-fs-pre.target. May 14 00:43:32.094956 systemd[1]: Stopped target swap.target. May 14 00:43:32.096076 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 14 00:43:32.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.096192 systemd[1]: Stopped dracut-pre-mount.service. May 14 00:43:32.100606 kernel: audit: type=1131 audit(1747183412.096:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.097298 systemd[1]: Stopped target cryptsetup.target. May 14 00:43:32.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.100223 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 14 00:43:32.106628 kernel: audit: type=1131 audit(1747183412.100:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.106643 kernel: audit: type=1131 audit(1747183412.103:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.100330 systemd[1]: Stopped dracut-initqueue.service. May 14 00:43:32.101495 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 14 00:43:32.101593 systemd[1]: Stopped ignition-fetch-offline.service. May 14 00:43:32.104451 systemd[1]: Stopped target paths.target. May 14 00:43:32.107382 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 14 00:43:32.111896 systemd[1]: Stopped systemd-ask-password-console.path. May 14 00:43:32.113435 systemd[1]: Stopped target slices.target. May 14 00:43:32.114275 systemd[1]: Stopped target sockets.target. May 14 00:43:32.115423 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 14 00:43:32.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.115550 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 14 00:43:32.122234 kernel: audit: type=1131 audit(1747183412.116:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.122254 kernel: audit: type=1131 audit(1747183412.119:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.116793 systemd[1]: ignition-files.service: Deactivated successfully. May 14 00:43:32.116905 systemd[1]: Stopped ignition-files.service. May 14 00:43:32.120925 systemd[1]: Stopping ignition-mount.service... May 14 00:43:32.125042 iscsid[750]: iscsid shutting down. May 14 00:43:32.123089 systemd[1]: Stopping iscsid.service... May 14 00:43:32.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.124762 systemd[1]: Stopping sysroot-boot.service... May 14 00:43:32.132549 kernel: audit: type=1131 audit(1747183412.126:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.132572 kernel: audit: type=1131 audit(1747183412.129:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.132622 ignition[901]: INFO : Ignition 2.14.0 May 14 00:43:32.132622 ignition[901]: INFO : Stage: umount May 14 00:43:32.132622 ignition[901]: INFO : no configs at "/usr/lib/ignition/base.d" May 14 00:43:32.132622 ignition[901]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 14 00:43:32.140651 kernel: audit: type=1131 audit(1747183412.133:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.125639 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 14 00:43:32.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.142806 ignition[901]: INFO : umount: umount passed May 14 00:43:32.142806 ignition[901]: INFO : Ignition finished successfully May 14 00:43:32.126171 systemd[1]: Stopped systemd-udev-trigger.service. May 14 00:43:32.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.127199 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 14 00:43:32.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.127337 systemd[1]: Stopped dracut-pre-trigger.service. May 14 00:43:32.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.132344 systemd[1]: iscsid.service: Deactivated successfully. May 14 00:43:32.132455 systemd[1]: Stopped iscsid.service. May 14 00:43:32.134322 systemd[1]: ignition-mount.service: Deactivated successfully. May 14 00:43:32.134408 systemd[1]: Stopped ignition-mount.service. May 14 00:43:32.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.138791 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 14 00:43:32.140236 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 14 00:43:32.140324 systemd[1]: Finished initrd-cleanup.service. May 14 00:43:32.143157 systemd[1]: iscsid.socket: Deactivated successfully. May 14 00:43:32.143191 systemd[1]: Closed iscsid.socket. May 14 00:43:32.144124 systemd[1]: ignition-disks.service: Deactivated successfully. May 14 00:43:32.144166 systemd[1]: Stopped ignition-disks.service. May 14 00:43:32.145508 systemd[1]: ignition-kargs.service: Deactivated successfully. May 14 00:43:32.145548 systemd[1]: Stopped ignition-kargs.service. May 14 00:43:32.147136 systemd[1]: ignition-setup.service: Deactivated successfully. May 14 00:43:32.147173 systemd[1]: Stopped ignition-setup.service. May 14 00:43:32.148550 systemd[1]: Stopping iscsiuio.service... May 14 00:43:32.151044 systemd[1]: iscsiuio.service: Deactivated successfully. May 14 00:43:32.151142 systemd[1]: Stopped iscsiuio.service. May 14 00:43:32.152632 systemd[1]: Stopped target network.target. May 14 00:43:32.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.154252 systemd[1]: iscsiuio.socket: Deactivated successfully. May 14 00:43:32.154285 systemd[1]: Closed iscsiuio.socket. May 14 00:43:32.155529 systemd[1]: Stopping systemd-networkd.service... May 14 00:43:32.156816 systemd[1]: Stopping systemd-resolved.service... May 14 00:43:32.162143 systemd-networkd[743]: eth0: DHCPv6 lease lost May 14 00:43:32.163905 systemd[1]: systemd-networkd.service: Deactivated successfully. May 14 00:43:32.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.171000 audit: BPF prog-id=9 op=UNLOAD May 14 00:43:32.163996 systemd[1]: Stopped systemd-networkd.service. May 14 00:43:32.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.165558 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 14 00:43:32.165587 systemd[1]: Closed systemd-networkd.socket. May 14 00:43:32.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.168547 systemd[1]: Stopping network-cleanup.service... May 14 00:43:32.170129 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 14 00:43:32.170181 systemd[1]: Stopped parse-ip-for-networkd.service. May 14 00:43:32.171428 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 14 00:43:32.171467 systemd[1]: Stopped systemd-sysctl.service. May 14 00:43:32.173461 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 14 00:43:32.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.173500 systemd[1]: Stopped systemd-modules-load.service. May 14 00:43:32.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.175020 systemd[1]: Stopping systemd-udevd.service... May 14 00:43:32.179382 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 14 00:43:32.185000 audit: BPF prog-id=6 op=UNLOAD May 14 00:43:32.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.179804 systemd[1]: systemd-resolved.service: Deactivated successfully. May 14 00:43:32.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.179900 systemd[1]: Stopped systemd-resolved.service. May 14 00:43:32.180956 systemd[1]: sysroot-boot.service: Deactivated successfully. May 14 00:43:32.181026 systemd[1]: Stopped sysroot-boot.service. May 14 00:43:32.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.182627 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 14 00:43:32.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.182669 systemd[1]: Stopped initrd-setup-root.service. May 14 00:43:32.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.185256 systemd[1]: network-cleanup.service: Deactivated successfully. May 14 00:43:32.185333 systemd[1]: Stopped network-cleanup.service. May 14 00:43:32.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.186595 systemd[1]: systemd-udevd.service: Deactivated successfully. May 14 00:43:32.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.186705 systemd[1]: Stopped systemd-udevd.service. May 14 00:43:32.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.188216 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 14 00:43:32.188250 systemd[1]: Closed systemd-udevd-control.socket. May 14 00:43:32.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.189334 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 14 00:43:32.189362 systemd[1]: Closed systemd-udevd-kernel.socket. May 14 00:43:32.190471 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 14 00:43:32.190506 systemd[1]: Stopped dracut-pre-udev.service. May 14 00:43:32.191840 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 14 00:43:32.191885 systemd[1]: Stopped dracut-cmdline.service. May 14 00:43:32.192928 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 14 00:43:32.192960 systemd[1]: Stopped dracut-cmdline-ask.service. May 14 00:43:32.194886 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 14 00:43:32.195473 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 14 00:43:32.195522 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 14 00:43:32.197549 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 14 00:43:32.197583 systemd[1]: Stopped kmod-static-nodes.service. May 14 00:43:32.198226 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 14 00:43:32.198258 systemd[1]: Stopped systemd-vconsole-setup.service. May 14 00:43:32.200308 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 14 00:43:32.200676 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 14 00:43:32.200752 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 14 00:43:32.201942 systemd[1]: Reached target initrd-switch-root.target. May 14 00:43:32.203804 systemd[1]: Starting initrd-switch-root.service... May 14 00:43:32.209779 systemd[1]: Switching root. May 14 00:43:32.226110 systemd-journald[289]: Journal stopped May 14 00:43:34.202502 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). May 14 00:43:34.205012 kernel: SELinux: Class mctp_socket not defined in policy. May 14 00:43:34.205035 kernel: SELinux: Class anon_inode not defined in policy. May 14 00:43:34.205046 kernel: SELinux: the above unknown classes and permissions will be allowed May 14 00:43:34.205056 kernel: SELinux: policy capability network_peer_controls=1 May 14 00:43:34.205069 kernel: SELinux: policy capability open_perms=1 May 14 00:43:34.205079 kernel: SELinux: policy capability extended_socket_class=1 May 14 00:43:34.205088 kernel: SELinux: policy capability always_check_network=0 May 14 00:43:34.205103 kernel: SELinux: policy capability cgroup_seclabel=1 May 14 00:43:34.205114 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 14 00:43:34.205123 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 14 00:43:34.205133 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 14 00:43:34.205146 systemd[1]: Successfully loaded SELinux policy in 33.582ms. May 14 00:43:34.205162 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.766ms. May 14 00:43:34.205174 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 14 00:43:34.205186 systemd[1]: Detected virtualization kvm. May 14 00:43:34.205196 systemd[1]: Detected architecture arm64. May 14 00:43:34.205206 systemd[1]: Detected first boot. May 14 00:43:34.205218 systemd[1]: Initializing machine ID from VM UUID. May 14 00:43:34.205229 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 14 00:43:34.205238 systemd[1]: Populated /etc with preset unit settings. May 14 00:43:34.205249 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:43:34.205262 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:43:34.205275 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:43:34.205286 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 14 00:43:34.205305 systemd[1]: Stopped initrd-switch-root.service. May 14 00:43:34.205316 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 14 00:43:34.205327 systemd[1]: Created slice system-addon\x2dconfig.slice. May 14 00:43:34.205338 systemd[1]: Created slice system-addon\x2drun.slice. May 14 00:43:34.205348 systemd[1]: Created slice system-getty.slice. May 14 00:43:34.205360 systemd[1]: Created slice system-modprobe.slice. May 14 00:43:34.205371 systemd[1]: Created slice system-serial\x2dgetty.slice. May 14 00:43:34.205382 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 14 00:43:34.205392 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 14 00:43:34.205403 systemd[1]: Created slice user.slice. May 14 00:43:34.205414 systemd[1]: Started systemd-ask-password-console.path. May 14 00:43:34.205424 systemd[1]: Started systemd-ask-password-wall.path. May 14 00:43:34.205435 systemd[1]: Set up automount boot.automount. May 14 00:43:34.205446 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 14 00:43:34.205457 systemd[1]: Stopped target initrd-switch-root.target. May 14 00:43:34.205468 systemd[1]: Stopped target initrd-fs.target. May 14 00:43:34.205479 systemd[1]: Stopped target initrd-root-fs.target. May 14 00:43:34.205490 systemd[1]: Reached target integritysetup.target. May 14 00:43:34.205500 systemd[1]: Reached target remote-cryptsetup.target. May 14 00:43:34.205511 systemd[1]: Reached target remote-fs.target. May 14 00:43:34.205522 systemd[1]: Reached target slices.target. May 14 00:43:34.205533 systemd[1]: Reached target swap.target. May 14 00:43:34.205544 systemd[1]: Reached target torcx.target. May 14 00:43:34.205555 systemd[1]: Reached target veritysetup.target. May 14 00:43:34.205567 systemd[1]: Listening on systemd-coredump.socket. May 14 00:43:34.205577 systemd[1]: Listening on systemd-initctl.socket. May 14 00:43:34.205588 systemd[1]: Listening on systemd-networkd.socket. May 14 00:43:34.205599 systemd[1]: Listening on systemd-udevd-control.socket. May 14 00:43:34.205610 systemd[1]: Listening on systemd-udevd-kernel.socket. May 14 00:43:34.205621 systemd[1]: Listening on systemd-userdbd.socket. May 14 00:43:34.205634 systemd[1]: Mounting dev-hugepages.mount... May 14 00:43:34.205646 systemd[1]: Mounting dev-mqueue.mount... May 14 00:43:34.205657 systemd[1]: Mounting media.mount... May 14 00:43:34.205671 systemd[1]: Mounting sys-kernel-debug.mount... May 14 00:43:34.205702 systemd[1]: Mounting sys-kernel-tracing.mount... May 14 00:43:34.205714 systemd[1]: Mounting tmp.mount... May 14 00:43:34.205725 systemd[1]: Starting flatcar-tmpfiles.service... May 14 00:43:34.205736 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:43:34.205746 systemd[1]: Starting kmod-static-nodes.service... May 14 00:43:34.205757 systemd[1]: Starting modprobe@configfs.service... May 14 00:43:34.205769 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:43:34.205780 systemd[1]: Starting modprobe@drm.service... May 14 00:43:34.205790 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:43:34.205801 systemd[1]: Starting modprobe@fuse.service... May 14 00:43:34.205811 systemd[1]: Starting modprobe@loop.service... May 14 00:43:34.205822 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 14 00:43:34.205833 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 14 00:43:34.205857 systemd[1]: Stopped systemd-fsck-root.service. May 14 00:43:34.205869 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 14 00:43:34.205882 systemd[1]: Stopped systemd-fsck-usr.service. May 14 00:43:34.205893 systemd[1]: Stopped systemd-journald.service. May 14 00:43:34.205905 kernel: fuse: init (API version 7.34) May 14 00:43:34.205915 systemd[1]: Starting systemd-journald.service... May 14 00:43:34.205925 systemd[1]: Starting systemd-modules-load.service... May 14 00:43:34.205936 systemd[1]: Starting systemd-network-generator.service... May 14 00:43:34.205947 systemd[1]: Starting systemd-remount-fs.service... May 14 00:43:34.205957 systemd[1]: Starting systemd-udev-trigger.service... May 14 00:43:34.205968 systemd[1]: verity-setup.service: Deactivated successfully. May 14 00:43:34.205980 systemd[1]: Stopped verity-setup.service. May 14 00:43:34.205990 kernel: loop: module loaded May 14 00:43:34.206001 systemd[1]: Mounted dev-hugepages.mount. May 14 00:43:34.206011 systemd[1]: Mounted dev-mqueue.mount. May 14 00:43:34.206027 systemd[1]: Mounted media.mount. May 14 00:43:34.206040 systemd[1]: Mounted sys-kernel-debug.mount. May 14 00:43:34.206051 systemd[1]: Mounted sys-kernel-tracing.mount. May 14 00:43:34.206061 systemd[1]: Mounted tmp.mount. May 14 00:43:34.206072 systemd[1]: Finished kmod-static-nodes.service. May 14 00:43:34.206082 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 14 00:43:34.206095 systemd[1]: Finished modprobe@configfs.service. May 14 00:43:34.206106 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:43:34.206117 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:43:34.206127 systemd[1]: modprobe@drm.service: Deactivated successfully. May 14 00:43:34.206141 systemd-journald[997]: Journal started May 14 00:43:34.206185 systemd-journald[997]: Runtime Journal (/run/log/journal/05a2b5ec88d14e0abf5549c15eba62dc) is 6.0M, max 48.7M, 42.6M free. May 14 00:43:32.284000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 14 00:43:32.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 14 00:43:32.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 14 00:43:32.367000 audit: BPF prog-id=10 op=LOAD May 14 00:43:32.367000 audit: BPF prog-id=10 op=UNLOAD May 14 00:43:32.367000 audit: BPF prog-id=11 op=LOAD May 14 00:43:32.367000 audit: BPF prog-id=11 op=UNLOAD May 14 00:43:32.406000 audit[935]: AVC avc: denied { associate } for pid=935 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 14 00:43:32.406000 audit[935]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58a2 a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=918 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:32.406000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 14 00:43:32.407000 audit[935]: AVC avc: denied { associate } for pid=935 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 14 00:43:32.407000 audit[935]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5979 a2=1ed a3=0 items=2 ppid=918 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:32.407000 audit: CWD cwd="/" May 14 00:43:32.407000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:43:32.407000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:43:32.407000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 14 00:43:34.063000 audit: BPF prog-id=12 op=LOAD May 14 00:43:34.063000 audit: BPF prog-id=3 op=UNLOAD May 14 00:43:34.063000 audit: BPF prog-id=13 op=LOAD May 14 00:43:34.063000 audit: BPF prog-id=14 op=LOAD May 14 00:43:34.063000 audit: BPF prog-id=4 op=UNLOAD May 14 00:43:34.063000 audit: BPF prog-id=5 op=UNLOAD May 14 00:43:34.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.072000 audit: BPF prog-id=12 op=UNLOAD May 14 00:43:34.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.164000 audit: BPF prog-id=15 op=LOAD May 14 00:43:34.166000 audit: BPF prog-id=16 op=LOAD May 14 00:43:34.169000 audit: BPF prog-id=17 op=LOAD May 14 00:43:34.169000 audit: BPF prog-id=13 op=UNLOAD May 14 00:43:34.169000 audit: BPF prog-id=14 op=UNLOAD May 14 00:43:34.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.201000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 14 00:43:34.201000 audit[997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffffbe45b40 a2=4000 a3=1 items=0 ppid=1 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:34.201000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 14 00:43:34.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.405737 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:43:34.207220 systemd[1]: Finished modprobe@drm.service. May 14 00:43:34.062784 systemd[1]: Queued start job for default target multi-user.target. May 14 00:43:32.405993 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 14 00:43:34.062795 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 14 00:43:32.406011 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 14 00:43:34.065500 systemd[1]: systemd-journald.service: Deactivated successfully. May 14 00:43:32.406047 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 14 00:43:32.406057 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="skipped missing lower profile" missing profile=oem May 14 00:43:32.406082 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 14 00:43:32.406093 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 14 00:43:32.406283 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 14 00:43:34.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:32.406317 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 14 00:43:32.406328 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 14 00:43:32.406710 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 14 00:43:32.406744 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 14 00:43:32.406760 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 14 00:43:32.406774 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 14 00:43:32.406789 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 14 00:43:32.406802 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 14 00:43:33.815910 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:43:33.816176 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:43:33.816280 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:43:33.816442 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 14 00:43:33.816492 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 14 00:43:33.816547 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-14T00:43:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 14 00:43:34.209405 systemd[1]: Started systemd-journald.service. May 14 00:43:34.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.210195 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:43:34.210334 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:43:34.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.211586 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 14 00:43:34.211745 systemd[1]: Finished modprobe@fuse.service. May 14 00:43:34.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.212864 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:43:34.213014 systemd[1]: Finished modprobe@loop.service. May 14 00:43:34.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.214232 systemd[1]: Finished flatcar-tmpfiles.service. May 14 00:43:34.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.215401 systemd[1]: Finished systemd-modules-load.service. May 14 00:43:34.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.216650 systemd[1]: Finished systemd-network-generator.service. May 14 00:43:34.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.217928 systemd[1]: Finished systemd-remount-fs.service. May 14 00:43:34.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.219343 systemd[1]: Reached target network-pre.target. May 14 00:43:34.221450 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 14 00:43:34.223484 systemd[1]: Mounting sys-kernel-config.mount... May 14 00:43:34.224261 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 14 00:43:34.226478 systemd[1]: Starting systemd-hwdb-update.service... May 14 00:43:34.228583 systemd[1]: Starting systemd-journal-flush.service... May 14 00:43:34.229635 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:43:34.230752 systemd[1]: Starting systemd-random-seed.service... May 14 00:43:34.231833 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:43:34.233281 systemd[1]: Starting systemd-sysctl.service... May 14 00:43:34.240039 systemd[1]: Starting systemd-sysusers.service... May 14 00:43:34.243179 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 14 00:43:34.246674 systemd-journald[997]: Time spent on flushing to /var/log/journal/05a2b5ec88d14e0abf5549c15eba62dc is 16.039ms for 992 entries. May 14 00:43:34.246674 systemd-journald[997]: System Journal (/var/log/journal/05a2b5ec88d14e0abf5549c15eba62dc) is 8.0M, max 195.6M, 187.6M free. May 14 00:43:34.271826 systemd-journald[997]: Received client request to flush runtime journal. May 14 00:43:34.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.244795 systemd[1]: Mounted sys-kernel-config.mount. May 14 00:43:34.245737 systemd[1]: Finished systemd-random-seed.service. May 14 00:43:34.272522 udevadm[1036]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 14 00:43:34.246643 systemd[1]: Reached target first-boot-complete.target. May 14 00:43:34.258629 systemd[1]: Finished systemd-udev-trigger.service. May 14 00:43:34.260659 systemd[1]: Starting systemd-udev-settle.service... May 14 00:43:34.261803 systemd[1]: Finished systemd-sysctl.service. May 14 00:43:34.272684 systemd[1]: Finished systemd-journal-flush.service. May 14 00:43:34.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.277557 systemd[1]: Finished systemd-sysusers.service. May 14 00:43:34.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.279314 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 14 00:43:34.294572 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 14 00:43:34.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.589540 systemd[1]: Finished systemd-hwdb-update.service. May 14 00:43:34.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.590000 audit: BPF prog-id=18 op=LOAD May 14 00:43:34.590000 audit: BPF prog-id=19 op=LOAD May 14 00:43:34.590000 audit: BPF prog-id=7 op=UNLOAD May 14 00:43:34.590000 audit: BPF prog-id=8 op=UNLOAD May 14 00:43:34.591607 systemd[1]: Starting systemd-udevd.service... May 14 00:43:34.606958 systemd-udevd[1040]: Using default interface naming scheme 'v252'. May 14 00:43:34.623145 systemd[1]: Started systemd-udevd.service. May 14 00:43:34.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.623000 audit: BPF prog-id=20 op=LOAD May 14 00:43:34.625955 systemd[1]: Starting systemd-networkd.service... May 14 00:43:34.653000 audit: BPF prog-id=21 op=LOAD May 14 00:43:34.653000 audit: BPF prog-id=22 op=LOAD May 14 00:43:34.653000 audit: BPF prog-id=23 op=LOAD May 14 00:43:34.654970 systemd[1]: Starting systemd-userdbd.service... May 14 00:43:34.657595 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 14 00:43:34.686081 systemd[1]: Started systemd-userdbd.service. May 14 00:43:34.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.696288 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 14 00:43:34.723198 systemd[1]: Finished systemd-udev-settle.service. May 14 00:43:34.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.725466 systemd[1]: Starting lvm2-activation-early.service... May 14 00:43:34.739222 lvm[1073]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 14 00:43:34.741584 systemd-networkd[1048]: lo: Link UP May 14 00:43:34.741818 systemd-networkd[1048]: lo: Gained carrier May 14 00:43:34.742276 systemd-networkd[1048]: Enumeration completed May 14 00:43:34.742460 systemd-networkd[1048]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 14 00:43:34.742464 systemd[1]: Started systemd-networkd.service. May 14 00:43:34.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.744339 systemd-networkd[1048]: eth0: Link UP May 14 00:43:34.744413 systemd-networkd[1048]: eth0: Gained carrier May 14 00:43:34.771727 systemd[1]: Finished lvm2-activation-early.service. May 14 00:43:34.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.772760 systemd[1]: Reached target cryptsetup.target. May 14 00:43:34.774735 systemd[1]: Starting lvm2-activation.service... May 14 00:43:34.775079 systemd-networkd[1048]: eth0: DHCPv4 address 10.0.0.73/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 14 00:43:34.778432 lvm[1074]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 14 00:43:34.804665 systemd[1]: Finished lvm2-activation.service. May 14 00:43:34.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.805646 systemd[1]: Reached target local-fs-pre.target. May 14 00:43:34.806550 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 14 00:43:34.806578 systemd[1]: Reached target local-fs.target. May 14 00:43:34.807421 systemd[1]: Reached target machines.target. May 14 00:43:34.809431 systemd[1]: Starting ldconfig.service... May 14 00:43:34.810523 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:43:34.810608 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:43:34.811909 systemd[1]: Starting systemd-boot-update.service... May 14 00:43:34.813916 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 14 00:43:34.816423 systemd[1]: Starting systemd-machine-id-commit.service... May 14 00:43:34.818502 systemd[1]: Starting systemd-sysext.service... May 14 00:43:34.819662 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1076 (bootctl) May 14 00:43:34.821196 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 14 00:43:34.829678 systemd[1]: Unmounting usr-share-oem.mount... May 14 00:43:34.831502 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 14 00:43:34.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.842041 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 14 00:43:34.842360 systemd[1]: Unmounted usr-share-oem.mount. May 14 00:43:34.882274 systemd[1]: Finished systemd-machine-id-commit.service. May 14 00:43:34.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.883867 kernel: loop0: detected capacity change from 0 to 189592 May 14 00:43:34.894880 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 14 00:43:34.903602 systemd-fsck[1087]: fsck.fat 4.2 (2021-01-31) May 14 00:43:34.903602 systemd-fsck[1087]: /dev/vda1: 236 files, 117310/258078 clusters May 14 00:43:34.905579 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 14 00:43:34.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.914877 kernel: loop1: detected capacity change from 0 to 189592 May 14 00:43:34.919215 (sd-sysext)[1090]: Using extensions 'kubernetes'. May 14 00:43:34.919668 (sd-sysext)[1090]: Merged extensions into '/usr'. May 14 00:43:34.937528 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:43:34.939251 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:43:34.941320 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:43:34.943392 systemd[1]: Starting modprobe@loop.service... May 14 00:43:34.944140 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:43:34.944310 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:43:34.945313 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:43:34.945448 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:43:34.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.946651 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:43:34.946769 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:43:34.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.947870 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:43:34.947976 systemd[1]: Finished modprobe@loop.service. May 14 00:43:34.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:34.949085 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:43:34.949238 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:43:34.989273 ldconfig[1075]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 14 00:43:34.992841 systemd[1]: Finished ldconfig.service. May 14 00:43:34.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.188571 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 14 00:43:35.190431 systemd[1]: Mounting boot.mount... May 14 00:43:35.192137 systemd[1]: Mounting usr-share-oem.mount... May 14 00:43:35.198074 systemd[1]: Mounted boot.mount. May 14 00:43:35.198812 systemd[1]: Mounted usr-share-oem.mount. May 14 00:43:35.200616 systemd[1]: Finished systemd-sysext.service. May 14 00:43:35.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.202622 systemd[1]: Starting ensure-sysext.service... May 14 00:43:35.204494 systemd[1]: Starting systemd-tmpfiles-setup.service... May 14 00:43:35.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.207160 systemd[1]: Finished systemd-boot-update.service. May 14 00:43:35.209317 systemd[1]: Reloading. May 14 00:43:35.213435 systemd-tmpfiles[1098]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 14 00:43:35.214222 systemd-tmpfiles[1098]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 14 00:43:35.215644 systemd-tmpfiles[1098]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 14 00:43:35.243971 /usr/lib/systemd/system-generators/torcx-generator[1118]: time="2025-05-14T00:43:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:43:35.244285 /usr/lib/systemd/system-generators/torcx-generator[1118]: time="2025-05-14T00:43:35Z" level=info msg="torcx already run" May 14 00:43:35.299273 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:43:35.299291 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:43:35.314530 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:43:35.354000 audit: BPF prog-id=24 op=LOAD May 14 00:43:35.354000 audit: BPF prog-id=15 op=UNLOAD May 14 00:43:35.354000 audit: BPF prog-id=25 op=LOAD May 14 00:43:35.354000 audit: BPF prog-id=26 op=LOAD May 14 00:43:35.354000 audit: BPF prog-id=16 op=UNLOAD May 14 00:43:35.354000 audit: BPF prog-id=17 op=UNLOAD May 14 00:43:35.355000 audit: BPF prog-id=27 op=LOAD May 14 00:43:35.355000 audit: BPF prog-id=28 op=LOAD May 14 00:43:35.355000 audit: BPF prog-id=18 op=UNLOAD May 14 00:43:35.355000 audit: BPF prog-id=19 op=UNLOAD May 14 00:43:35.355000 audit: BPF prog-id=29 op=LOAD May 14 00:43:35.355000 audit: BPF prog-id=21 op=UNLOAD May 14 00:43:35.355000 audit: BPF prog-id=30 op=LOAD May 14 00:43:35.355000 audit: BPF prog-id=31 op=LOAD May 14 00:43:35.355000 audit: BPF prog-id=22 op=UNLOAD May 14 00:43:35.355000 audit: BPF prog-id=23 op=UNLOAD May 14 00:43:35.357000 audit: BPF prog-id=32 op=LOAD May 14 00:43:35.357000 audit: BPF prog-id=20 op=UNLOAD May 14 00:43:35.359695 systemd[1]: Finished systemd-tmpfiles-setup.service. May 14 00:43:35.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.363659 systemd[1]: Starting audit-rules.service... May 14 00:43:35.365836 systemd[1]: Starting clean-ca-certificates.service... May 14 00:43:35.368320 systemd[1]: Starting systemd-journal-catalog-update.service... May 14 00:43:35.370000 audit: BPF prog-id=33 op=LOAD May 14 00:43:35.374692 systemd[1]: Starting systemd-resolved.service... May 14 00:43:35.378000 audit: BPF prog-id=34 op=LOAD May 14 00:43:35.380213 systemd[1]: Starting systemd-timesyncd.service... May 14 00:43:35.381984 systemd[1]: Starting systemd-update-utmp.service... May 14 00:43:35.385257 systemd[1]: Finished clean-ca-certificates.service. May 14 00:43:35.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.387863 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:43:35.388000 audit[1167]: SYSTEM_BOOT pid=1167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 14 00:43:35.393091 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:43:35.395111 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:43:35.396795 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:43:35.399118 systemd[1]: Starting modprobe@loop.service... May 14 00:43:35.400005 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:43:35.400165 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:43:35.400302 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:43:35.401535 systemd[1]: Finished systemd-journal-catalog-update.service. May 14 00:43:35.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.402743 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:43:35.402946 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:43:35.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.404083 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:43:35.404184 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:43:35.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.405423 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:43:35.405530 systemd[1]: Finished modprobe@loop.service. May 14 00:43:35.406601 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:43:35.406731 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:43:35.408298 systemd[1]: Starting systemd-update-done.service... May 14 00:43:35.409604 systemd[1]: Finished systemd-update-utmp.service. May 14 00:43:35.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:35.412263 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:43:35.413353 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:43:35.415111 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:43:35.416868 systemd[1]: Starting modprobe@loop.service... May 14 00:43:35.416000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 14 00:43:35.416000 audit[1179]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff3e9ee00 a2=420 a3=0 items=0 ppid=1156 pid=1179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:35.416000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 14 00:43:35.417139 augenrules[1179]: No rules May 14 00:43:35.417464 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:43:35.417585 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:43:35.417687 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:43:35.418589 systemd[1]: Finished audit-rules.service. May 14 00:43:35.419572 systemd[1]: Finished systemd-update-done.service. May 14 00:43:35.420597 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:43:35.420717 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:43:35.421766 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:43:35.421889 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:43:35.422834 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:43:35.422953 systemd[1]: Finished modprobe@loop.service. May 14 00:43:35.423965 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:43:35.424068 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:43:35.426312 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 14 00:43:35.427567 systemd[1]: Starting modprobe@dm_mod.service... May 14 00:43:35.429439 systemd[1]: Starting modprobe@drm.service... May 14 00:43:35.431360 systemd[1]: Starting modprobe@efi_pstore.service... May 14 00:43:35.433251 systemd[1]: Starting modprobe@loop.service... May 14 00:43:35.433897 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 14 00:43:35.434020 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:43:35.435241 systemd[1]: Starting systemd-networkd-wait-online.service... May 14 00:43:35.436008 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 14 00:43:35.437256 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 14 00:43:35.437383 systemd[1]: Finished modprobe@dm_mod.service. May 14 00:43:35.438470 systemd[1]: modprobe@drm.service: Deactivated successfully. May 14 00:43:35.438585 systemd[1]: Finished modprobe@drm.service. May 14 00:43:35.439573 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 14 00:43:35.439689 systemd[1]: Finished modprobe@efi_pstore.service. May 14 00:43:35.440650 systemd[1]: Started systemd-timesyncd.service. May 14 00:43:35.441578 systemd-timesyncd[1161]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 14 00:43:35.441624 systemd-timesyncd[1161]: Initial clock synchronization to Wed 2025-05-14 00:43:35.674207 UTC. May 14 00:43:35.442110 systemd[1]: modprobe@loop.service: Deactivated successfully. May 14 00:43:35.442223 systemd[1]: Finished modprobe@loop.service. May 14 00:43:35.443405 systemd[1]: Reached target time-set.target. May 14 00:43:35.444115 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 14 00:43:35.444155 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 14 00:43:35.444422 systemd[1]: Finished ensure-sysext.service. May 14 00:43:35.450320 systemd-resolved[1160]: Positive Trust Anchors: May 14 00:43:35.450329 systemd-resolved[1160]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 14 00:43:35.450356 systemd-resolved[1160]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 14 00:43:35.462116 systemd-resolved[1160]: Defaulting to hostname 'linux'. May 14 00:43:35.463388 systemd[1]: Started systemd-resolved.service. May 14 00:43:35.464085 systemd[1]: Reached target network.target. May 14 00:43:35.464639 systemd[1]: Reached target nss-lookup.target. May 14 00:43:35.465223 systemd[1]: Reached target sysinit.target. May 14 00:43:35.465821 systemd[1]: Started motdgen.path. May 14 00:43:35.466382 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 14 00:43:35.467299 systemd[1]: Started logrotate.timer. May 14 00:43:35.467918 systemd[1]: Started mdadm.timer. May 14 00:43:35.468407 systemd[1]: Started systemd-tmpfiles-clean.timer. May 14 00:43:35.469028 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 14 00:43:35.469052 systemd[1]: Reached target paths.target. May 14 00:43:35.469560 systemd[1]: Reached target timers.target. May 14 00:43:35.470408 systemd[1]: Listening on dbus.socket. May 14 00:43:35.471832 systemd[1]: Starting docker.socket... May 14 00:43:35.474802 systemd[1]: Listening on sshd.socket. May 14 00:43:35.475494 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:43:35.475933 systemd[1]: Listening on docker.socket. May 14 00:43:35.476563 systemd[1]: Reached target sockets.target. May 14 00:43:35.477144 systemd[1]: Reached target basic.target. May 14 00:43:35.477702 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 14 00:43:35.477730 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 14 00:43:35.478674 systemd[1]: Starting containerd.service... May 14 00:43:35.480242 systemd[1]: Starting dbus.service... May 14 00:43:35.481837 systemd[1]: Starting enable-oem-cloudinit.service... May 14 00:43:35.483733 systemd[1]: Starting extend-filesystems.service... May 14 00:43:35.484520 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 14 00:43:35.485777 systemd[1]: Starting motdgen.service... May 14 00:43:35.489024 systemd[1]: Starting prepare-helm.service... May 14 00:43:35.490983 systemd[1]: Starting ssh-key-proc-cmdline.service... May 14 00:43:35.492793 systemd[1]: Starting sshd-keygen.service... May 14 00:43:35.495503 systemd[1]: Starting systemd-logind.service... May 14 00:43:35.496272 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 14 00:43:35.496343 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 14 00:43:35.496744 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 14 00:43:35.497501 systemd[1]: Starting update-engine.service... May 14 00:43:35.501869 jq[1198]: false May 14 00:43:35.502209 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 14 00:43:35.504973 jq[1213]: true May 14 00:43:35.505162 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 14 00:43:35.505354 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 14 00:43:35.506376 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 14 00:43:35.506536 systemd[1]: Finished ssh-key-proc-cmdline.service. May 14 00:43:35.515113 jq[1220]: true May 14 00:43:35.516540 systemd[1]: motdgen.service: Deactivated successfully. May 14 00:43:35.516719 systemd[1]: Finished motdgen.service. May 14 00:43:35.520917 tar[1219]: linux-arm64/helm May 14 00:43:35.527488 extend-filesystems[1199]: Found loop1 May 14 00:43:35.527488 extend-filesystems[1199]: Found vda May 14 00:43:35.527488 extend-filesystems[1199]: Found vda1 May 14 00:43:35.530088 extend-filesystems[1199]: Found vda2 May 14 00:43:35.530088 extend-filesystems[1199]: Found vda3 May 14 00:43:35.530088 extend-filesystems[1199]: Found usr May 14 00:43:35.530088 extend-filesystems[1199]: Found vda4 May 14 00:43:35.530088 extend-filesystems[1199]: Found vda6 May 14 00:43:35.530088 extend-filesystems[1199]: Found vda7 May 14 00:43:35.530088 extend-filesystems[1199]: Found vda9 May 14 00:43:35.530088 extend-filesystems[1199]: Checking size of /dev/vda9 May 14 00:43:35.554471 dbus-daemon[1197]: [system] SELinux support is enabled May 14 00:43:35.554662 systemd[1]: Started dbus.service. May 14 00:43:35.557098 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 14 00:43:35.557129 systemd[1]: Reached target system-config.target. May 14 00:43:35.557759 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 14 00:43:35.557780 systemd[1]: Reached target user-config.target. May 14 00:43:35.573604 systemd-logind[1209]: Watching system buttons on /dev/input/event0 (Power Button) May 14 00:43:35.573899 extend-filesystems[1199]: Resized partition /dev/vda9 May 14 00:43:35.601800 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 14 00:43:35.577075 systemd-logind[1209]: New seat seat0. May 14 00:43:35.601951 update_engine[1212]: I0514 00:43:35.593326 1212 main.cc:92] Flatcar Update Engine starting May 14 00:43:35.601951 update_engine[1212]: I0514 00:43:35.598230 1212 update_check_scheduler.cc:74] Next update check in 4m30s May 14 00:43:35.602153 extend-filesystems[1248]: resize2fs 1.46.5 (30-Dec-2021) May 14 00:43:35.603839 bash[1244]: Updated "/home/core/.ssh/authorized_keys" May 14 00:43:35.598105 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 14 00:43:35.604146 systemd[1]: Started update-engine.service. May 14 00:43:35.609546 systemd[1]: Started locksmithd.service. May 14 00:43:35.612205 systemd[1]: Started systemd-logind.service. May 14 00:43:35.617862 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 14 00:43:35.632707 extend-filesystems[1248]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 14 00:43:35.632707 extend-filesystems[1248]: old_desc_blocks = 1, new_desc_blocks = 1 May 14 00:43:35.632707 extend-filesystems[1248]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 14 00:43:35.637890 extend-filesystems[1199]: Resized filesystem in /dev/vda9 May 14 00:43:35.633507 systemd[1]: extend-filesystems.service: Deactivated successfully. May 14 00:43:35.633676 systemd[1]: Finished extend-filesystems.service. May 14 00:43:35.642176 env[1221]: time="2025-05-14T00:43:35.639361840Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 14 00:43:35.661077 locksmithd[1249]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 14 00:43:35.667285 env[1221]: time="2025-05-14T00:43:35.667249840Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 14 00:43:35.667413 env[1221]: time="2025-05-14T00:43:35.667380480Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 14 00:43:35.669253 env[1221]: time="2025-05-14T00:43:35.669220000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 14 00:43:35.669253 env[1221]: time="2025-05-14T00:43:35.669249800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 14 00:43:35.669467 env[1221]: time="2025-05-14T00:43:35.669444200Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 14 00:43:35.669467 env[1221]: time="2025-05-14T00:43:35.669465280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 14 00:43:35.669529 env[1221]: time="2025-05-14T00:43:35.669478160Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 14 00:43:35.669529 env[1221]: time="2025-05-14T00:43:35.669488280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 14 00:43:35.669579 env[1221]: time="2025-05-14T00:43:35.669557640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 14 00:43:35.669860 env[1221]: time="2025-05-14T00:43:35.669826000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 14 00:43:35.669998 env[1221]: time="2025-05-14T00:43:35.669969400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 14 00:43:35.669998 env[1221]: time="2025-05-14T00:43:35.669988920Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 14 00:43:35.670070 env[1221]: time="2025-05-14T00:43:35.670051960Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 14 00:43:35.670070 env[1221]: time="2025-05-14T00:43:35.670065920Z" level=info msg="metadata content store policy set" policy=shared May 14 00:43:35.673547 env[1221]: time="2025-05-14T00:43:35.673518520Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 14 00:43:35.673547 env[1221]: time="2025-05-14T00:43:35.673550920Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 14 00:43:35.673652 env[1221]: time="2025-05-14T00:43:35.673563960Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 14 00:43:35.673652 env[1221]: time="2025-05-14T00:43:35.673593320Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 14 00:43:35.673652 env[1221]: time="2025-05-14T00:43:35.673606640Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 14 00:43:35.673652 env[1221]: time="2025-05-14T00:43:35.673619560Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 14 00:43:35.673652 env[1221]: time="2025-05-14T00:43:35.673632920Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 14 00:43:35.673997 env[1221]: time="2025-05-14T00:43:35.673975800Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 14 00:43:35.674071 env[1221]: time="2025-05-14T00:43:35.674000160Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 14 00:43:35.674071 env[1221]: time="2025-05-14T00:43:35.674020880Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 14 00:43:35.674071 env[1221]: time="2025-05-14T00:43:35.674043840Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 14 00:43:35.674071 env[1221]: time="2025-05-14T00:43:35.674056000Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 14 00:43:35.674207 env[1221]: time="2025-05-14T00:43:35.674161520Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 14 00:43:35.674303 env[1221]: time="2025-05-14T00:43:35.674251040Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 14 00:43:35.675002 env[1221]: time="2025-05-14T00:43:35.674522200Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 14 00:43:35.675341 env[1221]: time="2025-05-14T00:43:35.675317160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 14 00:43:35.675717 env[1221]: time="2025-05-14T00:43:35.675594200Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 14 00:43:35.676052 env[1221]: time="2025-05-14T00:43:35.676021840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 14 00:43:35.676104 env[1221]: time="2025-05-14T00:43:35.676058720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 14 00:43:35.676104 env[1221]: time="2025-05-14T00:43:35.676076720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 14 00:43:35.676104 env[1221]: time="2025-05-14T00:43:35.676091600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 14 00:43:35.680045 env[1221]: time="2025-05-14T00:43:35.680006480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 14 00:43:35.680223 env[1221]: time="2025-05-14T00:43:35.680136320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 14 00:43:35.680297 env[1221]: time="2025-05-14T00:43:35.680281600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 14 00:43:35.680355 env[1221]: time="2025-05-14T00:43:35.680342840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 14 00:43:35.680490 env[1221]: time="2025-05-14T00:43:35.680472720Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 14 00:43:35.680796 env[1221]: time="2025-05-14T00:43:35.680775920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 14 00:43:35.680947 env[1221]: time="2025-05-14T00:43:35.680930320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 14 00:43:35.681031 env[1221]: time="2025-05-14T00:43:35.681006400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 14 00:43:35.681154 env[1221]: time="2025-05-14T00:43:35.681077760Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 14 00:43:35.681248 env[1221]: time="2025-05-14T00:43:35.681224520Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 14 00:43:35.681362 env[1221]: time="2025-05-14T00:43:35.681345840Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 14 00:43:35.681432 env[1221]: time="2025-05-14T00:43:35.681418120Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 14 00:43:35.681571 env[1221]: time="2025-05-14T00:43:35.681497960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 14 00:43:35.681951 env[1221]: time="2025-05-14T00:43:35.681893600Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 14 00:43:35.684387 env[1221]: time="2025-05-14T00:43:35.682405200Z" level=info msg="Connect containerd service" May 14 00:43:35.684387 env[1221]: time="2025-05-14T00:43:35.682450000Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 14 00:43:35.685366 env[1221]: time="2025-05-14T00:43:35.685328880Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 14 00:43:35.685757 env[1221]: time="2025-05-14T00:43:35.685673400Z" level=info msg="Start subscribing containerd event" May 14 00:43:35.685757 env[1221]: time="2025-05-14T00:43:35.685729880Z" level=info msg="Start recovering state" May 14 00:43:35.685828 env[1221]: time="2025-05-14T00:43:35.685789040Z" level=info msg="Start event monitor" May 14 00:43:35.685828 env[1221]: time="2025-05-14T00:43:35.685806440Z" level=info msg="Start snapshots syncer" May 14 00:43:35.685828 env[1221]: time="2025-05-14T00:43:35.685814840Z" level=info msg="Start cni network conf syncer for default" May 14 00:43:35.685828 env[1221]: time="2025-05-14T00:43:35.685822360Z" level=info msg="Start streaming server" May 14 00:43:35.686100 env[1221]: time="2025-05-14T00:43:35.686080040Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 14 00:43:35.686289 env[1221]: time="2025-05-14T00:43:35.686272160Z" level=info msg=serving... address=/run/containerd/containerd.sock May 14 00:43:35.686565 systemd[1]: Started containerd.service. May 14 00:43:35.687482 env[1221]: time="2025-05-14T00:43:35.686746440Z" level=info msg="containerd successfully booted in 0.048797s" May 14 00:43:35.823050 systemd-networkd[1048]: eth0: Gained IPv6LL May 14 00:43:35.824694 systemd[1]: Finished systemd-networkd-wait-online.service. May 14 00:43:35.825732 systemd[1]: Reached target network-online.target. May 14 00:43:35.827904 systemd[1]: Starting kubelet.service... May 14 00:43:35.903488 tar[1219]: linux-arm64/LICENSE May 14 00:43:35.903703 tar[1219]: linux-arm64/README.md May 14 00:43:35.907866 systemd[1]: Finished prepare-helm.service. May 14 00:43:36.356229 systemd[1]: Started kubelet.service. May 14 00:43:36.829821 kubelet[1265]: E0514 00:43:36.829717 1265 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:43:36.831824 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:43:36.831972 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:43:36.907345 sshd_keygen[1215]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 14 00:43:36.925667 systemd[1]: Finished sshd-keygen.service. May 14 00:43:36.927899 systemd[1]: Starting issuegen.service... May 14 00:43:36.932364 systemd[1]: issuegen.service: Deactivated successfully. May 14 00:43:36.932510 systemd[1]: Finished issuegen.service. May 14 00:43:36.934607 systemd[1]: Starting systemd-user-sessions.service... May 14 00:43:36.940730 systemd[1]: Finished systemd-user-sessions.service. May 14 00:43:36.942850 systemd[1]: Started getty@tty1.service. May 14 00:43:36.944962 systemd[1]: Started serial-getty@ttyAMA0.service. May 14 00:43:36.945978 systemd[1]: Reached target getty.target. May 14 00:43:36.946907 systemd[1]: Reached target multi-user.target. May 14 00:43:36.949136 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 14 00:43:36.955810 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 14 00:43:36.955990 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 14 00:43:36.956818 systemd[1]: Startup finished in 545ms (kernel) + 4.679s (initrd) + 4.707s (userspace) = 9.932s. May 14 00:43:40.303257 systemd[1]: Created slice system-sshd.slice. May 14 00:43:40.304455 systemd[1]: Started sshd@0-10.0.0.73:22-10.0.0.1:38392.service. May 14 00:43:40.355103 sshd[1287]: Accepted publickey for core from 10.0.0.1 port 38392 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:43:40.357199 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:43:40.367251 systemd[1]: Created slice user-500.slice. May 14 00:43:40.368427 systemd[1]: Starting user-runtime-dir@500.service... May 14 00:43:40.370266 systemd-logind[1209]: New session 1 of user core. May 14 00:43:40.376437 systemd[1]: Finished user-runtime-dir@500.service. May 14 00:43:40.377782 systemd[1]: Starting user@500.service... May 14 00:43:40.380553 (systemd)[1290]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 14 00:43:40.439528 systemd[1290]: Queued start job for default target default.target. May 14 00:43:40.440051 systemd[1290]: Reached target paths.target. May 14 00:43:40.440084 systemd[1290]: Reached target sockets.target. May 14 00:43:40.440095 systemd[1290]: Reached target timers.target. May 14 00:43:40.440105 systemd[1290]: Reached target basic.target. May 14 00:43:40.440145 systemd[1290]: Reached target default.target. May 14 00:43:40.440168 systemd[1290]: Startup finished in 54ms. May 14 00:43:40.440249 systemd[1]: Started user@500.service. May 14 00:43:40.441381 systemd[1]: Started session-1.scope. May 14 00:43:40.493135 systemd[1]: Started sshd@1-10.0.0.73:22-10.0.0.1:38398.service. May 14 00:43:40.543527 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 38398 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:43:40.544896 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:43:40.549717 systemd[1]: Started session-2.scope. May 14 00:43:40.550020 systemd-logind[1209]: New session 2 of user core. May 14 00:43:40.605840 sshd[1299]: pam_unix(sshd:session): session closed for user core May 14 00:43:40.610854 systemd[1]: sshd@1-10.0.0.73:22-10.0.0.1:38398.service: Deactivated successfully. May 14 00:43:40.611490 systemd[1]: session-2.scope: Deactivated successfully. May 14 00:43:40.612193 systemd-logind[1209]: Session 2 logged out. Waiting for processes to exit. May 14 00:43:40.613349 systemd[1]: Started sshd@2-10.0.0.73:22-10.0.0.1:38406.service. May 14 00:43:40.614451 systemd-logind[1209]: Removed session 2. May 14 00:43:40.657965 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 38406 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:43:40.659514 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:43:40.663071 systemd-logind[1209]: New session 3 of user core. May 14 00:43:40.663914 systemd[1]: Started session-3.scope. May 14 00:43:40.715021 sshd[1305]: pam_unix(sshd:session): session closed for user core May 14 00:43:40.718929 systemd[1]: sshd@2-10.0.0.73:22-10.0.0.1:38406.service: Deactivated successfully. May 14 00:43:40.719532 systemd[1]: session-3.scope: Deactivated successfully. May 14 00:43:40.720163 systemd-logind[1209]: Session 3 logged out. Waiting for processes to exit. May 14 00:43:40.721376 systemd[1]: Started sshd@3-10.0.0.73:22-10.0.0.1:38420.service. May 14 00:43:40.722167 systemd-logind[1209]: Removed session 3. May 14 00:43:40.765002 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 38420 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:43:40.766678 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:43:40.770175 systemd-logind[1209]: New session 4 of user core. May 14 00:43:40.771047 systemd[1]: Started session-4.scope. May 14 00:43:40.827237 sshd[1311]: pam_unix(sshd:session): session closed for user core May 14 00:43:40.829692 systemd[1]: sshd@3-10.0.0.73:22-10.0.0.1:38420.service: Deactivated successfully. May 14 00:43:40.830282 systemd[1]: session-4.scope: Deactivated successfully. May 14 00:43:40.831899 systemd-logind[1209]: Session 4 logged out. Waiting for processes to exit. May 14 00:43:40.833093 systemd[1]: Started sshd@4-10.0.0.73:22-10.0.0.1:38436.service. May 14 00:43:40.833832 systemd-logind[1209]: Removed session 4. May 14 00:43:40.877601 sshd[1317]: Accepted publickey for core from 10.0.0.1 port 38436 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:43:40.879142 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:43:40.882360 systemd-logind[1209]: New session 5 of user core. May 14 00:43:40.883220 systemd[1]: Started session-5.scope. May 14 00:43:40.941122 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 14 00:43:40.941354 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:43:40.956029 dbus-daemon[1197]: avc: received setenforce notice (enforcing=1) May 14 00:43:40.956959 sudo[1320]: pam_unix(sudo:session): session closed for user root May 14 00:43:40.959080 sshd[1317]: pam_unix(sshd:session): session closed for user core May 14 00:43:40.961927 systemd[1]: sshd@4-10.0.0.73:22-10.0.0.1:38436.service: Deactivated successfully. May 14 00:43:40.962526 systemd[1]: session-5.scope: Deactivated successfully. May 14 00:43:40.963145 systemd-logind[1209]: Session 5 logged out. Waiting for processes to exit. May 14 00:43:40.964322 systemd[1]: Started sshd@5-10.0.0.73:22-10.0.0.1:38438.service. May 14 00:43:40.964914 systemd-logind[1209]: Removed session 5. May 14 00:43:41.008967 sshd[1324]: Accepted publickey for core from 10.0.0.1 port 38438 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:43:41.010410 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:43:41.014750 systemd[1]: Started session-6.scope. May 14 00:43:41.015729 systemd-logind[1209]: New session 6 of user core. May 14 00:43:41.068017 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 14 00:43:41.068234 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:43:41.070775 sudo[1328]: pam_unix(sudo:session): session closed for user root May 14 00:43:41.074923 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 14 00:43:41.075139 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:43:41.083063 systemd[1]: Stopping audit-rules.service... May 14 00:43:41.082000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 14 00:43:41.084987 auditctl[1331]: No rules May 14 00:43:41.086140 kernel: kauditd_printk_skb: 150 callbacks suppressed May 14 00:43:41.086192 kernel: audit: type=1305 audit(1747183421.082:188): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 14 00:43:41.086222 kernel: audit: type=1300 audit(1747183421.082:188): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffb6db3c0 a2=420 a3=0 items=0 ppid=1 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.082000 audit[1331]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffb6db3c0 a2=420 a3=0 items=0 ppid=1 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.086543 systemd[1]: audit-rules.service: Deactivated successfully. May 14 00:43:41.086700 systemd[1]: Stopped audit-rules.service. May 14 00:43:41.088165 systemd[1]: Starting audit-rules.service... May 14 00:43:41.082000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 14 00:43:41.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:41.091897 kernel: audit: type=1327 audit(1747183421.082:188): proctitle=2F7362696E2F617564697463746C002D44 May 14 00:43:41.091948 kernel: audit: type=1131 audit(1747183421.086:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:41.103474 augenrules[1348]: No rules May 14 00:43:41.104110 systemd[1]: Finished audit-rules.service. May 14 00:43:41.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:41.106420 sudo[1327]: pam_unix(sudo:session): session closed for user root May 14 00:43:41.105000 audit[1327]: USER_END pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:43:41.109333 kernel: audit: type=1130 audit(1747183421.103:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:41.109394 kernel: audit: type=1106 audit(1747183421.105:191): pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:43:41.105000 audit[1327]: CRED_DISP pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:43:41.109513 sshd[1324]: pam_unix(sshd:session): session closed for user core May 14 00:43:41.111886 kernel: audit: type=1104 audit(1747183421.105:192): pid=1327 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:43:41.112710 systemd[1]: Started sshd@6-10.0.0.73:22-10.0.0.1:38442.service. May 14 00:43:41.111000 audit[1324]: USER_END pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:43:41.114282 systemd[1]: sshd@5-10.0.0.73:22-10.0.0.1:38438.service: Deactivated successfully. May 14 00:43:41.114993 systemd[1]: session-6.scope: Deactivated successfully. May 14 00:43:41.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.73:22-10.0.0.1:38442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:41.116037 systemd-logind[1209]: Session 6 logged out. Waiting for processes to exit. May 14 00:43:41.116773 systemd-logind[1209]: Removed session 6. May 14 00:43:41.117715 kernel: audit: type=1106 audit(1747183421.111:193): pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:43:41.117745 kernel: audit: type=1130 audit(1747183421.111:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.73:22-10.0.0.1:38442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:41.117768 kernel: audit: type=1104 audit(1747183421.112:195): pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:43:41.112000 audit[1324]: CRED_DISP pid=1324 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:43:41.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.73:22-10.0.0.1:38438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:41.156000 audit[1353]: USER_ACCT pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:43:41.158664 sshd[1353]: Accepted publickey for core from 10.0.0.1 port 38442 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:43:41.158000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:43:41.158000 audit[1353]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde223ff0 a2=3 a3=1 items=0 ppid=1 pid=1353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.158000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:43:41.159458 sshd[1353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:43:41.163363 systemd[1]: Started session-7.scope. May 14 00:43:41.163642 systemd-logind[1209]: New session 7 of user core. May 14 00:43:41.166000 audit[1353]: USER_START pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:43:41.167000 audit[1356]: CRED_ACQ pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:43:41.213000 audit[1357]: USER_ACCT pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:43:41.215955 sudo[1357]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 14 00:43:41.214000 audit[1357]: CRED_REFR pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:43:41.216176 sudo[1357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 14 00:43:41.215000 audit[1357]: USER_START pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:43:41.271082 systemd[1]: Starting docker.service... May 14 00:43:41.353694 env[1368]: time="2025-05-14T00:43:41.353635799Z" level=info msg="Starting up" May 14 00:43:41.355193 env[1368]: time="2025-05-14T00:43:41.355162562Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 14 00:43:41.355193 env[1368]: time="2025-05-14T00:43:41.355186961Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 14 00:43:41.355262 env[1368]: time="2025-05-14T00:43:41.355214201Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 14 00:43:41.355262 env[1368]: time="2025-05-14T00:43:41.355225690Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 14 00:43:41.358575 env[1368]: time="2025-05-14T00:43:41.358540010Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 14 00:43:41.358575 env[1368]: time="2025-05-14T00:43:41.358564490Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 14 00:43:41.358738 env[1368]: time="2025-05-14T00:43:41.358579511Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 14 00:43:41.358738 env[1368]: time="2025-05-14T00:43:41.358588807Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 14 00:43:41.363590 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport68906291-merged.mount: Deactivated successfully. May 14 00:43:41.479369 env[1368]: time="2025-05-14T00:43:41.479275994Z" level=info msg="Loading containers: start." May 14 00:43:41.532000 audit[1402]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.532000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc1e928c0 a2=0 a3=1 items=0 ppid=1368 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.532000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 14 00:43:41.534000 audit[1404]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.534000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc568c290 a2=0 a3=1 items=0 ppid=1368 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 14 00:43:41.535000 audit[1406]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.535000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdd7a3cd0 a2=0 a3=1 items=0 ppid=1368 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 14 00:43:41.537000 audit[1408]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.537000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc7b4ad60 a2=0 a3=1 items=0 ppid=1368 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 14 00:43:41.539000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.539000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffccf60cc0 a2=0 a3=1 items=0 ppid=1368 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.539000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 14 00:43:41.565000 audit[1415]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.565000 audit[1415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcce660e0 a2=0 a3=1 items=0 ppid=1368 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.565000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 14 00:43:41.571000 audit[1417]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.571000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe15eecd0 a2=0 a3=1 items=0 ppid=1368 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.571000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 14 00:43:41.573000 audit[1419]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.573000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc3979bb0 a2=0 a3=1 items=0 ppid=1368 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.573000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 14 00:43:41.575000 audit[1421]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.575000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff4a5cb10 a2=0 a3=1 items=0 ppid=1368 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.575000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:43:41.581000 audit[1425]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.581000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd20a7480 a2=0 a3=1 items=0 ppid=1368 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 14 00:43:41.588000 audit[1426]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.588000 audit[1426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe9bd0a40 a2=0 a3=1 items=0 ppid=1368 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:43:41.597885 kernel: Initializing XFRM netlink socket May 14 00:43:41.620636 env[1368]: time="2025-05-14T00:43:41.620596119Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 14 00:43:41.636000 audit[1434]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.636000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffea2f2520 a2=0 a3=1 items=0 ppid=1368 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.636000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 14 00:43:41.658000 audit[1437]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.658000 audit[1437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffdbf15740 a2=0 a3=1 items=0 ppid=1368 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 14 00:43:41.661000 audit[1440]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.661000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd90f6fd0 a2=0 a3=1 items=0 ppid=1368 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 14 00:43:41.663000 audit[1442]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.663000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc2248a70 a2=0 a3=1 items=0 ppid=1368 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 14 00:43:41.665000 audit[1444]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.665000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffecfc9760 a2=0 a3=1 items=0 ppid=1368 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.665000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 14 00:43:41.667000 audit[1446]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.667000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc6b2a1c0 a2=0 a3=1 items=0 ppid=1368 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 14 00:43:41.668000 audit[1448]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.668000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff465b9a0 a2=0 a3=1 items=0 ppid=1368 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.668000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 14 00:43:41.677000 audit[1451]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.677000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffcce4f6a0 a2=0 a3=1 items=0 ppid=1368 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 14 00:43:41.679000 audit[1453]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.679000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc0df8260 a2=0 a3=1 items=0 ppid=1368 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 14 00:43:41.680000 audit[1455]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.680000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe2f3f780 a2=0 a3=1 items=0 ppid=1368 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.680000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 14 00:43:41.682000 audit[1457]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.682000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe3b91410 a2=0 a3=1 items=0 ppid=1368 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.682000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 14 00:43:41.683951 systemd-networkd[1048]: docker0: Link UP May 14 00:43:41.688000 audit[1461]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.688000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffefaa80a0 a2=0 a3=1 items=0 ppid=1368 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 14 00:43:41.695000 audit[1462]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:43:41.695000 audit[1462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe4b0ff10 a2=0 a3=1 items=0 ppid=1368 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:43:41.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 14 00:43:41.698067 env[1368]: time="2025-05-14T00:43:41.698025590Z" level=info msg="Loading containers: done." May 14 00:43:41.720938 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4269975568-merged.mount: Deactivated successfully. May 14 00:43:41.728730 env[1368]: time="2025-05-14T00:43:41.728688851Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 14 00:43:41.729037 env[1368]: time="2025-05-14T00:43:41.729014559Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 14 00:43:41.729212 env[1368]: time="2025-05-14T00:43:41.729193428Z" level=info msg="Daemon has completed initialization" May 14 00:43:41.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:41.744997 systemd[1]: Started docker.service. May 14 00:43:41.751292 env[1368]: time="2025-05-14T00:43:41.751240960Z" level=info msg="API listen on /run/docker.sock" May 14 00:43:42.629992 env[1221]: time="2025-05-14T00:43:42.629948567Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 14 00:43:43.377442 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3754530099.mount: Deactivated successfully. May 14 00:43:45.153074 env[1221]: time="2025-05-14T00:43:45.153012094Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:45.154310 env[1221]: time="2025-05-14T00:43:45.154284121Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef8fb1ea7c9599dbedea6f9d5589975ebc5bf4ec72f6be6acaaec59a723a09b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:45.156032 env[1221]: time="2025-05-14T00:43:45.156004032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:45.157694 env[1221]: time="2025-05-14T00:43:45.157668946Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:45.158655 env[1221]: time="2025-05-14T00:43:45.158615754Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:ef8fb1ea7c9599dbedea6f9d5589975ebc5bf4ec72f6be6acaaec59a723a09b3\"" May 14 00:43:45.159516 env[1221]: time="2025-05-14T00:43:45.159488803Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 14 00:43:46.836656 env[1221]: time="2025-05-14T00:43:46.836613679Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:46.838519 env[1221]: time="2025-05-14T00:43:46.838218587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ea6e6085feca75547d0422ab0536fe0d18c9ff5831de7a9d6a707c968027bb6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:46.841171 env[1221]: time="2025-05-14T00:43:46.841146461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:46.843463 env[1221]: time="2025-05-14T00:43:46.843438789Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:46.844128 env[1221]: time="2025-05-14T00:43:46.844100776Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:ea6e6085feca75547d0422ab0536fe0d18c9ff5831de7a9d6a707c968027bb6a\"" May 14 00:43:46.845295 env[1221]: time="2025-05-14T00:43:46.845266226Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 14 00:43:47.047869 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 14 00:43:47.048029 systemd[1]: Stopped kubelet.service. May 14 00:43:47.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:47.049361 systemd[1]: Starting kubelet.service... May 14 00:43:47.050509 kernel: kauditd_printk_skb: 84 callbacks suppressed May 14 00:43:47.050561 kernel: audit: type=1130 audit(1747183427.047:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:47.050581 kernel: audit: type=1131 audit(1747183427.047:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:47.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:47.134444 systemd[1]: Started kubelet.service. May 14 00:43:47.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:47.136890 kernel: audit: type=1130 audit(1747183427.133:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:47.221429 kubelet[1504]: E0514 00:43:47.221373 1504 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:43:47.223766 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:43:47.223914 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:43:47.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:43:47.226875 kernel: audit: type=1131 audit(1747183427.223:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:43:48.461964 env[1221]: time="2025-05-14T00:43:48.461909875Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:48.463349 env[1221]: time="2025-05-14T00:43:48.463322302Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d2db6ef0dd2f3e08bdfcd46afde7b755b05192841f563d8df54b807daaa7d8d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:48.465277 env[1221]: time="2025-05-14T00:43:48.465242446Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:48.466838 env[1221]: time="2025-05-14T00:43:48.466805429Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:48.468385 env[1221]: time="2025-05-14T00:43:48.468357831Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:1d2db6ef0dd2f3e08bdfcd46afde7b755b05192841f563d8df54b807daaa7d8d\"" May 14 00:43:48.468963 env[1221]: time="2025-05-14T00:43:48.468941471Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 14 00:43:49.612930 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2572960000.mount: Deactivated successfully. May 14 00:43:50.060090 env[1221]: time="2025-05-14T00:43:50.060048234Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:50.061482 env[1221]: time="2025-05-14T00:43:50.061448206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c5361ece77e80334cd5fb082c0b678cb3244f5834ecacea1719ae6b38b465581,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:50.063523 env[1221]: time="2025-05-14T00:43:50.063485865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:50.064832 env[1221]: time="2025-05-14T00:43:50.064807928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:50.065238 env[1221]: time="2025-05-14T00:43:50.065214906Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:c5361ece77e80334cd5fb082c0b678cb3244f5834ecacea1719ae6b38b465581\"" May 14 00:43:50.065868 env[1221]: time="2025-05-14T00:43:50.065805503Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 14 00:43:50.600908 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3285381075.mount: Deactivated successfully. May 14 00:43:51.692649 env[1221]: time="2025-05-14T00:43:51.692596187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:51.695208 env[1221]: time="2025-05-14T00:43:51.695169969Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:51.697106 env[1221]: time="2025-05-14T00:43:51.697071804Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:51.699011 env[1221]: time="2025-05-14T00:43:51.698983919Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:51.699887 env[1221]: time="2025-05-14T00:43:51.699841673Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" May 14 00:43:51.700480 env[1221]: time="2025-05-14T00:43:51.700457480Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 14 00:43:52.203748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2004208917.mount: Deactivated successfully. May 14 00:43:52.208079 env[1221]: time="2025-05-14T00:43:52.208045120Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:52.209946 env[1221]: time="2025-05-14T00:43:52.209913595Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:52.211701 env[1221]: time="2025-05-14T00:43:52.211676870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:52.213050 env[1221]: time="2025-05-14T00:43:52.213018943Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:52.213745 env[1221]: time="2025-05-14T00:43:52.213711553Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 14 00:43:52.214193 env[1221]: time="2025-05-14T00:43:52.214164142Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 14 00:43:52.730040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3893807316.mount: Deactivated successfully. May 14 00:43:55.632558 env[1221]: time="2025-05-14T00:43:55.632512581Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:55.634175 env[1221]: time="2025-05-14T00:43:55.634142482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:55.636300 env[1221]: time="2025-05-14T00:43:55.636271449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:55.641669 env[1221]: time="2025-05-14T00:43:55.641637646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:43:55.643595 env[1221]: time="2025-05-14T00:43:55.643568157Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" May 14 00:43:57.298016 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 14 00:43:57.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:57.298181 systemd[1]: Stopped kubelet.service. May 14 00:43:57.299516 systemd[1]: Starting kubelet.service... May 14 00:43:57.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:57.301793 kernel: audit: type=1130 audit(1747183437.297:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:57.301841 kernel: audit: type=1131 audit(1747183437.297:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:57.385902 systemd[1]: Started kubelet.service. May 14 00:43:57.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:57.388892 kernel: audit: type=1130 audit(1747183437.385:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:43:57.426673 kubelet[1534]: E0514 00:43:57.426624 1534 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 14 00:43:57.428532 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 14 00:43:57.428694 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 14 00:43:57.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:43:57.430873 kernel: audit: type=1131 audit(1747183437.427:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 14 00:44:00.896912 systemd[1]: Stopped kubelet.service. May 14 00:44:00.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:00.898807 systemd[1]: Starting kubelet.service... May 14 00:44:00.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:00.900896 kernel: audit: type=1130 audit(1747183440.896:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:00.900987 kernel: audit: type=1131 audit(1747183440.896:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:00.920043 systemd[1]: Reloading. May 14 00:44:00.966856 /usr/lib/systemd/system-generators/torcx-generator[1569]: time="2025-05-14T00:44:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:44:00.966882 /usr/lib/systemd/system-generators/torcx-generator[1569]: time="2025-05-14T00:44:00Z" level=info msg="torcx already run" May 14 00:44:01.073374 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:44:01.073391 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:44:01.088522 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:44:01.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.138752 kernel: audit: type=1400 audit(1747183441.134:240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.138794 kernel: audit: type=1400 audit(1747183441.134:241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.138817 kernel: audit: type=1400 audit(1747183441.134:242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142224 kernel: audit: type=1400 audit(1747183441.134:243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.136000 audit: BPF prog-id=40 op=LOAD May 14 00:44:01.136000 audit: BPF prog-id=33 op=UNLOAD May 14 00:44:01.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit: BPF prog-id=41 op=LOAD May 14 00:44:01.137000 audit: BPF prog-id=35 op=UNLOAD May 14 00:44:01.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit: BPF prog-id=42 op=LOAD May 14 00:44:01.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.141000 audit: BPF prog-id=43 op=LOAD May 14 00:44:01.141000 audit: BPF prog-id=36 op=UNLOAD May 14 00:44:01.141000 audit: BPF prog-id=37 op=UNLOAD May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit: BPF prog-id=44 op=LOAD May 14 00:44:01.142000 audit: BPF prog-id=24 op=UNLOAD May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit: BPF prog-id=45 op=LOAD May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.142000 audit: BPF prog-id=46 op=LOAD May 14 00:44:01.142000 audit: BPF prog-id=25 op=UNLOAD May 14 00:44:01.142000 audit: BPF prog-id=26 op=UNLOAD May 14 00:44:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit: BPF prog-id=47 op=LOAD May 14 00:44:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.143000 audit: BPF prog-id=48 op=LOAD May 14 00:44:01.143000 audit: BPF prog-id=27 op=UNLOAD May 14 00:44:01.143000 audit: BPF prog-id=28 op=UNLOAD May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit: BPF prog-id=49 op=LOAD May 14 00:44:01.144000 audit: BPF prog-id=29 op=UNLOAD May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit: BPF prog-id=50 op=LOAD May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.144000 audit: BPF prog-id=51 op=LOAD May 14 00:44:01.144000 audit: BPF prog-id=30 op=UNLOAD May 14 00:44:01.144000 audit: BPF prog-id=31 op=UNLOAD May 14 00:44:01.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit: BPF prog-id=52 op=LOAD May 14 00:44:01.146000 audit: BPF prog-id=34 op=UNLOAD May 14 00:44:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.146000 audit: BPF prog-id=53 op=LOAD May 14 00:44:01.146000 audit: BPF prog-id=38 op=UNLOAD May 14 00:44:01.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.147000 audit: BPF prog-id=54 op=LOAD May 14 00:44:01.147000 audit: BPF prog-id=32 op=UNLOAD May 14 00:44:01.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:01.157538 systemd[1]: Started kubelet.service. May 14 00:44:01.158693 systemd[1]: Stopping kubelet.service... May 14 00:44:01.158983 systemd[1]: kubelet.service: Deactivated successfully. May 14 00:44:01.159149 systemd[1]: Stopped kubelet.service. May 14 00:44:01.160520 systemd[1]: Starting kubelet.service... May 14 00:44:01.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:01.240649 systemd[1]: Started kubelet.service. May 14 00:44:01.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:01.270548 kubelet[1614]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:44:01.270548 kubelet[1614]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 14 00:44:01.270548 kubelet[1614]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:44:01.270865 kubelet[1614]: I0514 00:44:01.270717 1614 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 14 00:44:01.733638 kubelet[1614]: I0514 00:44:01.733593 1614 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 14 00:44:01.733638 kubelet[1614]: I0514 00:44:01.733624 1614 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 14 00:44:01.733895 kubelet[1614]: I0514 00:44:01.733872 1614 server.go:929] "Client rotation is on, will bootstrap in background" May 14 00:44:01.766140 kubelet[1614]: E0514 00:44:01.766116 1614 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.73:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.73:6443: connect: connection refused" logger="UnhandledError" May 14 00:44:01.768041 kubelet[1614]: I0514 00:44:01.768012 1614 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 14 00:44:01.779329 kubelet[1614]: E0514 00:44:01.779291 1614 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 14 00:44:01.779329 kubelet[1614]: I0514 00:44:01.779330 1614 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 14 00:44:01.782726 kubelet[1614]: I0514 00:44:01.782685 1614 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 14 00:44:01.783600 kubelet[1614]: I0514 00:44:01.783575 1614 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 14 00:44:01.783764 kubelet[1614]: I0514 00:44:01.783731 1614 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 14 00:44:01.783923 kubelet[1614]: I0514 00:44:01.783759 1614 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 14 00:44:01.784059 kubelet[1614]: I0514 00:44:01.784050 1614 topology_manager.go:138] "Creating topology manager with none policy" May 14 00:44:01.784086 kubelet[1614]: I0514 00:44:01.784062 1614 container_manager_linux.go:300] "Creating device plugin manager" May 14 00:44:01.784233 kubelet[1614]: I0514 00:44:01.784221 1614 state_mem.go:36] "Initialized new in-memory state store" May 14 00:44:01.787405 kubelet[1614]: I0514 00:44:01.787380 1614 kubelet.go:408] "Attempting to sync node with API server" May 14 00:44:01.787466 kubelet[1614]: I0514 00:44:01.787410 1614 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 14 00:44:01.787622 kubelet[1614]: I0514 00:44:01.787603 1614 kubelet.go:314] "Adding apiserver pod source" May 14 00:44:01.787622 kubelet[1614]: I0514 00:44:01.787617 1614 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 14 00:44:01.787675 kubelet[1614]: W0514 00:44:01.787608 1614 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused May 14 00:44:01.787675 kubelet[1614]: E0514 00:44:01.787659 1614 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.73:6443: connect: connection refused" logger="UnhandledError" May 14 00:44:01.788006 kubelet[1614]: W0514 00:44:01.787974 1614 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.73:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused May 14 00:44:01.788035 kubelet[1614]: E0514 00:44:01.788015 1614 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.73:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.73:6443: connect: connection refused" logger="UnhandledError" May 14 00:44:01.789816 kubelet[1614]: I0514 00:44:01.789789 1614 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 14 00:44:01.792089 kubelet[1614]: I0514 00:44:01.792075 1614 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 14 00:44:01.793026 kubelet[1614]: W0514 00:44:01.793005 1614 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 14 00:44:01.793667 kubelet[1614]: I0514 00:44:01.793651 1614 server.go:1269] "Started kubelet" May 14 00:44:01.795332 kubelet[1614]: I0514 00:44:01.795282 1614 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 14 00:44:01.795433 kubelet[1614]: I0514 00:44:01.795391 1614 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 14 00:44:01.795697 kubelet[1614]: I0514 00:44:01.795667 1614 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 14 00:44:01.794000 audit[1614]: AVC avc: denied { mac_admin } for pid=1614 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.794000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:44:01.794000 audit[1614]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000881290 a1=4000b64288 a2=4000881260 a3=25 items=0 ppid=1 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:44:01.794000 audit[1614]: AVC avc: denied { mac_admin } for pid=1614 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.794000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:44:01.794000 audit[1614]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000459b40 a1=4000b642a0 a2=4000881320 a3=25 items=0 ppid=1 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:44:01.796138 kubelet[1614]: I0514 00:44:01.795808 1614 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 14 00:44:01.796138 kubelet[1614]: I0514 00:44:01.795840 1614 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 14 00:44:01.796138 kubelet[1614]: I0514 00:44:01.795904 1614 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 14 00:44:01.796362 kubelet[1614]: I0514 00:44:01.796339 1614 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 14 00:44:01.796600 kubelet[1614]: I0514 00:44:01.796492 1614 server.go:460] "Adding debug handlers to kubelet server" May 14 00:44:01.797130 kubelet[1614]: I0514 00:44:01.797103 1614 volume_manager.go:289] "Starting Kubelet Volume Manager" May 14 00:44:01.797486 kubelet[1614]: E0514 00:44:01.797460 1614 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:44:01.797740 kubelet[1614]: I0514 00:44:01.797720 1614 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 14 00:44:01.798447 kubelet[1614]: I0514 00:44:01.797874 1614 reconciler.go:26] "Reconciler: start to sync state" May 14 00:44:01.798000 audit[1626]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:01.798000 audit[1626]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdda78160 a2=0 a3=1 items=0 ppid=1614 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 14 00:44:01.799000 audit[1627]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:01.799000 audit[1627]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd40cc6f0 a2=0 a3=1 items=0 ppid=1614 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 14 00:44:01.801144 kubelet[1614]: W0514 00:44:01.800788 1614 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused May 14 00:44:01.801144 kubelet[1614]: E0514 00:44:01.800855 1614 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.73:6443: connect: connection refused" logger="UnhandledError" May 14 00:44:01.801144 kubelet[1614]: I0514 00:44:01.801085 1614 factory.go:221] Registration of the systemd container factory successfully May 14 00:44:01.801278 kubelet[1614]: I0514 00:44:01.801157 1614 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 14 00:44:01.801637 kubelet[1614]: E0514 00:44:01.801609 1614 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.73:6443: connect: connection refused" interval="200ms" May 14 00:44:01.801000 audit[1629]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:01.801000 audit[1629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff192b410 a2=0 a3=1 items=0 ppid=1614 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:44:01.802000 audit[1631]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:01.802000 audit[1631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff6dc8130 a2=0 a3=1 items=0 ppid=1614 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:44:01.810355 kubelet[1614]: E0514 00:44:01.806891 1614 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.73:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.73:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183f3e15558db4eb default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-14 00:44:01.793627371 +0000 UTC m=+0.549548279,LastTimestamp:2025-05-14 00:44:01.793627371 +0000 UTC m=+0.549548279,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 14 00:44:01.810780 kubelet[1614]: I0514 00:44:01.810758 1614 factory.go:221] Registration of the containerd container factory successfully May 14 00:44:01.820000 audit[1638]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:01.820000 audit[1638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff5241a40 a2=0 a3=1 items=0 ppid=1614 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 14 00:44:01.821312 kubelet[1614]: I0514 00:44:01.821271 1614 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 14 00:44:01.821000 audit[1640]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:01.821000 audit[1640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc5015c0 a2=0 a3=1 items=0 ppid=1614 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 14 00:44:01.821000 audit[1639]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:01.821000 audit[1639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc3f32950 a2=0 a3=1 items=0 ppid=1614 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 14 00:44:01.822508 kubelet[1614]: I0514 00:44:01.822484 1614 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 14 00:44:01.822539 kubelet[1614]: I0514 00:44:01.822509 1614 status_manager.go:217] "Starting to sync pod status with apiserver" May 14 00:44:01.822539 kubelet[1614]: I0514 00:44:01.822525 1614 kubelet.go:2321] "Starting kubelet main sync loop" May 14 00:44:01.822591 kubelet[1614]: E0514 00:44:01.822565 1614 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 14 00:44:01.823124 kubelet[1614]: W0514 00:44:01.822986 1614 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused May 14 00:44:01.823124 kubelet[1614]: E0514 00:44:01.823020 1614 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.73:6443: connect: connection refused" logger="UnhandledError" May 14 00:44:01.822000 audit[1642]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:01.822000 audit[1642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd47e2d0 a2=0 a3=1 items=0 ppid=1614 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 14 00:44:01.822000 audit[1641]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:01.822000 audit[1641]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffffa97c30 a2=0 a3=1 items=0 ppid=1614 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 14 00:44:01.823000 audit[1643]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:01.823000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffef9ff980 a2=0 a3=1 items=0 ppid=1614 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 14 00:44:01.823000 audit[1644]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:01.823000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcf7ccce0 a2=0 a3=1 items=0 ppid=1614 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 14 00:44:01.824000 audit[1645]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:01.824000 audit[1645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff1d08990 a2=0 a3=1 items=0 ppid=1614 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 14 00:44:01.828194 kubelet[1614]: I0514 00:44:01.828176 1614 cpu_manager.go:214] "Starting CPU manager" policy="none" May 14 00:44:01.828194 kubelet[1614]: I0514 00:44:01.828191 1614 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 14 00:44:01.828297 kubelet[1614]: I0514 00:44:01.828207 1614 state_mem.go:36] "Initialized new in-memory state store" May 14 00:44:01.891588 kubelet[1614]: I0514 00:44:01.891556 1614 policy_none.go:49] "None policy: Start" May 14 00:44:01.892303 kubelet[1614]: I0514 00:44:01.892282 1614 memory_manager.go:170] "Starting memorymanager" policy="None" May 14 00:44:01.892303 kubelet[1614]: I0514 00:44:01.892307 1614 state_mem.go:35] "Initializing new in-memory state store" May 14 00:44:01.897693 kubelet[1614]: E0514 00:44:01.897637 1614 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:44:01.899327 systemd[1]: Created slice kubepods.slice. May 14 00:44:01.903255 systemd[1]: Created slice kubepods-burstable.slice. May 14 00:44:01.905609 systemd[1]: Created slice kubepods-besteffort.slice. May 14 00:44:01.906400 kubelet[1614]: W0514 00:44:01.906381 1614 helpers.go:245] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/cpuset.cpus.effective": open /sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/cpuset.cpus.effective: no such device May 14 00:44:01.915493 kubelet[1614]: I0514 00:44:01.915462 1614 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 14 00:44:01.913000 audit[1614]: AVC avc: denied { mac_admin } for pid=1614 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:01.913000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:44:01.913000 audit[1614]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d78c30 a1=4000d2ab40 a2=4000d78c00 a3=25 items=0 ppid=1 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:01.913000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:44:01.915711 kubelet[1614]: I0514 00:44:01.915519 1614 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 14 00:44:01.915711 kubelet[1614]: I0514 00:44:01.915621 1614 eviction_manager.go:189] "Eviction manager: starting control loop" May 14 00:44:01.915711 kubelet[1614]: I0514 00:44:01.915630 1614 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 14 00:44:01.916309 kubelet[1614]: I0514 00:44:01.916262 1614 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 14 00:44:01.917381 kubelet[1614]: E0514 00:44:01.917358 1614 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 14 00:44:01.929647 systemd[1]: Created slice kubepods-burstable-pod62cf41b304f2e52e8d37e49332e2450b.slice. May 14 00:44:01.943775 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 14 00:44:01.947550 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 14 00:44:02.002495 kubelet[1614]: E0514 00:44:02.002394 1614 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.73:6443: connect: connection refused" interval="400ms" May 14 00:44:02.017521 kubelet[1614]: I0514 00:44:02.017471 1614 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 14 00:44:02.019752 kubelet[1614]: E0514 00:44:02.019728 1614 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.73:6443/api/v1/nodes\": dial tcp 10.0.0.73:6443: connect: connection refused" node="localhost" May 14 00:44:02.098215 kubelet[1614]: I0514 00:44:02.098182 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:02.098342 kubelet[1614]: I0514 00:44:02.098328 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:02.098417 kubelet[1614]: I0514 00:44:02.098404 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:02.098487 kubelet[1614]: I0514 00:44:02.098475 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/62cf41b304f2e52e8d37e49332e2450b-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"62cf41b304f2e52e8d37e49332e2450b\") " pod="kube-system/kube-apiserver-localhost" May 14 00:44:02.098574 kubelet[1614]: I0514 00:44:02.098561 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/62cf41b304f2e52e8d37e49332e2450b-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"62cf41b304f2e52e8d37e49332e2450b\") " pod="kube-system/kube-apiserver-localhost" May 14 00:44:02.098652 kubelet[1614]: I0514 00:44:02.098640 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/62cf41b304f2e52e8d37e49332e2450b-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"62cf41b304f2e52e8d37e49332e2450b\") " pod="kube-system/kube-apiserver-localhost" May 14 00:44:02.098716 kubelet[1614]: I0514 00:44:02.098705 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:02.098775 kubelet[1614]: I0514 00:44:02.098764 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:02.098840 kubelet[1614]: I0514 00:44:02.098828 1614 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 14 00:44:02.221761 kubelet[1614]: I0514 00:44:02.221733 1614 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 14 00:44:02.222095 kubelet[1614]: E0514 00:44:02.222069 1614 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.73:6443/api/v1/nodes\": dial tcp 10.0.0.73:6443: connect: connection refused" node="localhost" May 14 00:44:02.245179 kubelet[1614]: E0514 00:44:02.245151 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:02.245561 kubelet[1614]: E0514 00:44:02.245510 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:02.246074 env[1221]: time="2025-05-14T00:44:02.245800057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:62cf41b304f2e52e8d37e49332e2450b,Namespace:kube-system,Attempt:0,}" May 14 00:44:02.246767 env[1221]: time="2025-05-14T00:44:02.246735421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 14 00:44:02.249994 kubelet[1614]: E0514 00:44:02.249961 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:02.250307 env[1221]: time="2025-05-14T00:44:02.250279861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 14 00:44:02.403550 kubelet[1614]: E0514 00:44:02.403494 1614 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.73:6443: connect: connection refused" interval="800ms" May 14 00:44:02.623721 kubelet[1614]: I0514 00:44:02.623493 1614 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 14 00:44:02.623835 kubelet[1614]: E0514 00:44:02.623784 1614 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.73:6443/api/v1/nodes\": dial tcp 10.0.0.73:6443: connect: connection refused" node="localhost" May 14 00:44:02.769956 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3060944020.mount: Deactivated successfully. May 14 00:44:02.775314 env[1221]: time="2025-05-14T00:44:02.775278268Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.776293 env[1221]: time="2025-05-14T00:44:02.776252267Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.777445 env[1221]: time="2025-05-14T00:44:02.777420922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.778235 env[1221]: time="2025-05-14T00:44:02.778207112Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.779785 env[1221]: time="2025-05-14T00:44:02.779762035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.782037 env[1221]: time="2025-05-14T00:44:02.782009104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.785054 env[1221]: time="2025-05-14T00:44:02.785031111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.787069 env[1221]: time="2025-05-14T00:44:02.787043408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.788524 env[1221]: time="2025-05-14T00:44:02.788501444Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.789467 env[1221]: time="2025-05-14T00:44:02.789442934Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.790447 env[1221]: time="2025-05-14T00:44:02.790416773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.791417 env[1221]: time="2025-05-14T00:44:02.791393895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:02.815939 env[1221]: time="2025-05-14T00:44:02.815878956Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:02.815939 env[1221]: time="2025-05-14T00:44:02.815916590Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:02.815939 env[1221]: time="2025-05-14T00:44:02.815927480Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:02.816107 env[1221]: time="2025-05-14T00:44:02.816070209Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2cbe77020b42b0b7628342b0ab6edd44d8338041815aafa558f94482740fdac1 pid=1667 runtime=io.containerd.runc.v2 May 14 00:44:02.816622 env[1221]: time="2025-05-14T00:44:02.815474391Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:02.816622 env[1221]: time="2025-05-14T00:44:02.815514267Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:02.816622 env[1221]: time="2025-05-14T00:44:02.815524436Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:02.816622 env[1221]: time="2025-05-14T00:44:02.815734265Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bf40574dd9497edf254e873c6d1124fd4c076c8392a267ba994e058aab612f4 pid=1666 runtime=io.containerd.runc.v2 May 14 00:44:02.818628 env[1221]: time="2025-05-14T00:44:02.818553050Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:02.818628 env[1221]: time="2025-05-14T00:44:02.818589403Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:02.818628 env[1221]: time="2025-05-14T00:44:02.818599372Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:02.818954 env[1221]: time="2025-05-14T00:44:02.818835465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38ad2f2a29032873d2812a4d18005ab4fc841cb2386b4cf86a21d2d20b10ff61 pid=1672 runtime=io.containerd.runc.v2 May 14 00:44:02.829430 systemd[1]: Started cri-containerd-2cbe77020b42b0b7628342b0ab6edd44d8338041815aafa558f94482740fdac1.scope. May 14 00:44:02.830322 systemd[1]: Started cri-containerd-8bf40574dd9497edf254e873c6d1124fd4c076c8392a267ba994e058aab612f4.scope. May 14 00:44:02.839634 systemd[1]: Started cri-containerd-38ad2f2a29032873d2812a4d18005ab4fc841cb2386b4cf86a21d2d20b10ff61.scope. May 14 00:44:02.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867581 kernel: kauditd_printk_skb: 219 callbacks suppressed May 14 00:44:02.867640 kernel: audit: type=1400 audit(1747183442.864:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867662 kernel: audit: type=1400 audit(1747183442.864:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.869292 kernel: audit: type=1400 audit(1747183442.864:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.871062 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 14 00:44:02.871123 kernel: audit: type=1400 audit(1747183442.864:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.871881 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 14 00:44:02.871938 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 14 00:44:02.871955 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 14 00:44:02.871972 kernel: audit: backlog limit exceeded May 14 00:44:02.872922 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 14 00:44:02.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.864000 audit: BPF prog-id=55 op=LOAD May 14 00:44:02.867000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1667 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263626537373032306234326230623736323833343262306162366564 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1667 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263626537373032306234326230623736323833343262306162366564 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit: BPF prog-id=56 op=LOAD May 14 00:44:02.867000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.867000 audit: BPF prog-id=57 op=LOAD May 14 00:44:02.867000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1667 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263626537373032306234326230623736323833343262306162366564 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862663430353734646439343937656466323534653837336336643131 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862663430353734646439343937656466323534653837336336643131 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.872000 audit: BPF prog-id=59 op=LOAD May 14 00:44:02.874000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=1672 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338616432663261323930333238373364323831326134643138303035 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=1672 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338616432663261323930333238373364323831326134643138303035 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.868000 audit: BPF prog-id=60 op=LOAD May 14 00:44:02.868000 audit[1692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862663430353734646439343937656466323534653837336336643131 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit: BPF prog-id=61 op=LOAD May 14 00:44:02.874000 audit[1692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862663430353734646439343937656466323534653837336336643131 May 14 00:44:02.874000 audit: BPF prog-id=61 op=UNLOAD May 14 00:44:02.868000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1667 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263626537373032306234326230623736323833343262306162366564 May 14 00:44:02.875000 audit: BPF prog-id=60 op=UNLOAD May 14 00:44:02.875000 audit: BPF prog-id=58 op=UNLOAD May 14 00:44:02.875000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit: BPF prog-id=57 op=UNLOAD May 14 00:44:02.875000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit: BPF prog-id=62 op=LOAD May 14 00:44:02.875000 audit[1692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862663430353734646439343937656466323534653837336336643131 May 14 00:44:02.875000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.875000 audit: BPF prog-id=63 op=LOAD May 14 00:44:02.875000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1667 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263626537373032306234326230623736323833343262306162366564 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.874000 audit: BPF prog-id=64 op=LOAD May 14 00:44:02.874000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=1672 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338616432663261323930333238373364323831326134643138303035 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.876000 audit: BPF prog-id=65 op=LOAD May 14 00:44:02.876000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=1672 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338616432663261323930333238373364323831326134643138303035 May 14 00:44:02.877000 audit: BPF prog-id=65 op=UNLOAD May 14 00:44:02.877000 audit: BPF prog-id=64 op=UNLOAD May 14 00:44:02.877000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:02.877000 audit: BPF prog-id=66 op=LOAD May 14 00:44:02.877000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=1672 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:02.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338616432663261323930333238373364323831326134643138303035 May 14 00:44:02.900981 env[1221]: time="2025-05-14T00:44:02.900485806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"2cbe77020b42b0b7628342b0ab6edd44d8338041815aafa558f94482740fdac1\"" May 14 00:44:02.906830 kubelet[1614]: E0514 00:44:02.901952 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:02.906945 env[1221]: time="2025-05-14T00:44:02.902886413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"38ad2f2a29032873d2812a4d18005ab4fc841cb2386b4cf86a21d2d20b10ff61\"" May 14 00:44:02.907458 env[1221]: time="2025-05-14T00:44:02.907427712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:62cf41b304f2e52e8d37e49332e2450b,Namespace:kube-system,Attempt:0,} returns sandbox id \"8bf40574dd9497edf254e873c6d1124fd4c076c8392a267ba994e058aab612f4\"" May 14 00:44:02.907568 kubelet[1614]: E0514 00:44:02.907543 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:02.908306 kubelet[1614]: E0514 00:44:02.908292 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:02.914151 env[1221]: time="2025-05-14T00:44:02.914108302Z" level=info msg="CreateContainer within sandbox \"2cbe77020b42b0b7628342b0ab6edd44d8338041815aafa558f94482740fdac1\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 14 00:44:02.914873 env[1221]: time="2025-05-14T00:44:02.914822547Z" level=info msg="CreateContainer within sandbox \"38ad2f2a29032873d2812a4d18005ab4fc841cb2386b4cf86a21d2d20b10ff61\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 14 00:44:02.915083 env[1221]: time="2025-05-14T00:44:02.915044908Z" level=info msg="CreateContainer within sandbox \"8bf40574dd9497edf254e873c6d1124fd4c076c8392a267ba994e058aab612f4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 14 00:44:02.925196 kubelet[1614]: W0514 00:44:02.925126 1614 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused May 14 00:44:02.925274 kubelet[1614]: E0514 00:44:02.925207 1614 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.73:6443: connect: connection refused" logger="UnhandledError" May 14 00:44:02.934064 env[1221]: time="2025-05-14T00:44:02.934028243Z" level=info msg="CreateContainer within sandbox \"2cbe77020b42b0b7628342b0ab6edd44d8338041815aafa558f94482740fdac1\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5dbc54e835b3f26aded088c931a2bc2786aaa173538831f1e2edc99e2296991e\"" May 14 00:44:02.934563 env[1221]: time="2025-05-14T00:44:02.934533779Z" level=info msg="StartContainer for \"5dbc54e835b3f26aded088c931a2bc2786aaa173538831f1e2edc99e2296991e\"" May 14 00:44:02.938011 env[1221]: time="2025-05-14T00:44:02.937974045Z" level=info msg="CreateContainer within sandbox \"8bf40574dd9497edf254e873c6d1124fd4c076c8392a267ba994e058aab612f4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"eca3b155d9894e789466e5fe5729a447f70046d8d9c5dc5c25ad08b7662e0e56\"" May 14 00:44:02.938416 env[1221]: time="2025-05-14T00:44:02.938382533Z" level=info msg="StartContainer for \"eca3b155d9894e789466e5fe5729a447f70046d8d9c5dc5c25ad08b7662e0e56\"" May 14 00:44:02.940978 env[1221]: time="2025-05-14T00:44:02.940942044Z" level=info msg="CreateContainer within sandbox \"38ad2f2a29032873d2812a4d18005ab4fc841cb2386b4cf86a21d2d20b10ff61\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d64c36aa37ebbaf521897dd2a84e33e4eb41ff23115ee4e9c5463000b15d73b7\"" May 14 00:44:02.941334 env[1221]: time="2025-05-14T00:44:02.941312578Z" level=info msg="StartContainer for \"d64c36aa37ebbaf521897dd2a84e33e4eb41ff23115ee4e9c5463000b15d73b7\"" May 14 00:44:02.951083 systemd[1]: Started cri-containerd-5dbc54e835b3f26aded088c931a2bc2786aaa173538831f1e2edc99e2296991e.scope. May 14 00:44:02.960001 systemd[1]: Started cri-containerd-d64c36aa37ebbaf521897dd2a84e33e4eb41ff23115ee4e9c5463000b15d73b7.scope. May 14 00:44:02.960720 systemd[1]: Started cri-containerd-eca3b155d9894e789466e5fe5729a447f70046d8d9c5dc5c25ad08b7662e0e56.scope. May 14 00:44:03.001333 kubelet[1614]: W0514 00:44:03.001253 1614 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused May 14 00:44:03.001450 kubelet[1614]: E0514 00:44:03.001344 1614 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.73:6443: connect: connection refused" logger="UnhandledError" May 14 00:44:03.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.003000 audit: BPF prog-id=67 op=LOAD May 14 00:44:03.004000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1666 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613362313535643938393465373839343636653566653537323961 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1666 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613362313535643938393465373839343636653566653537323961 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.004000 audit: BPF prog-id=68 op=LOAD May 14 00:44:03.004000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1666 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613362313535643938393465373839343636653566653537323961 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit: BPF prog-id=69 op=LOAD May 14 00:44:03.005000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1666 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613362313535643938393465373839343636653566653537323961 May 14 00:44:03.005000 audit: BPF prog-id=69 op=UNLOAD May 14 00:44:03.005000 audit: BPF prog-id=68 op=UNLOAD May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit: BPF prog-id=70 op=LOAD May 14 00:44:03.005000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1666 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613362313535643938393465373839343636653566653537323961 May 14 00:44:03.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.005000 audit: BPF prog-id=71 op=LOAD May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1667 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564626335346538333562336632366164656430383863393331613262 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1667 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564626335346538333562336632366164656430383863393331613262 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit: BPF prog-id=72 op=LOAD May 14 00:44:03.006000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1667 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564626335346538333562336632366164656430383863393331613262 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit: BPF prog-id=73 op=LOAD May 14 00:44:03.006000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1667 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564626335346538333562336632366164656430383863393331613262 May 14 00:44:03.006000 audit: BPF prog-id=73 op=UNLOAD May 14 00:44:03.006000 audit: BPF prog-id=72 op=UNLOAD May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit: BPF prog-id=74 op=LOAD May 14 00:44:03.006000 audit[1787]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1667 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564626335346538333562336632366164656430383863393331613262 May 14 00:44:03.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.007000 audit: BPF prog-id=75 op=LOAD May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c7b38 a2=10 a3=0 items=0 ppid=1672 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436346333366161333765626261663532313839376464326138346533 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=1672 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436346333366161333765626261663532313839376464326138346533 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit: BPF prog-id=76 op=LOAD May 14 00:44:03.008000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c78e0 a2=78 a3=0 items=0 ppid=1672 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436346333366161333765626261663532313839376464326138346533 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit: BPF prog-id=77 op=LOAD May 14 00:44:03.008000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c7670 a2=78 a3=0 items=0 ppid=1672 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436346333366161333765626261663532313839376464326138346533 May 14 00:44:03.008000 audit: BPF prog-id=77 op=UNLOAD May 14 00:44:03.008000 audit: BPF prog-id=76 op=UNLOAD May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:03.008000 audit: BPF prog-id=78 op=LOAD May 14 00:44:03.008000 audit[1807]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c7b40 a2=78 a3=0 items=0 ppid=1672 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:03.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436346333366161333765626261663532313839376464326138346533 May 14 00:44:03.033620 env[1221]: time="2025-05-14T00:44:03.033528925Z" level=info msg="StartContainer for \"eca3b155d9894e789466e5fe5729a447f70046d8d9c5dc5c25ad08b7662e0e56\" returns successfully" May 14 00:44:03.035862 env[1221]: time="2025-05-14T00:44:03.035819454Z" level=info msg="StartContainer for \"d64c36aa37ebbaf521897dd2a84e33e4eb41ff23115ee4e9c5463000b15d73b7\" returns successfully" May 14 00:44:03.044163 env[1221]: time="2025-05-14T00:44:03.042493246Z" level=info msg="StartContainer for \"5dbc54e835b3f26aded088c931a2bc2786aaa173538831f1e2edc99e2296991e\" returns successfully" May 14 00:44:03.204346 kubelet[1614]: E0514 00:44:03.204295 1614 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.73:6443: connect: connection refused" interval="1.6s" May 14 00:44:03.425803 kubelet[1614]: I0514 00:44:03.425760 1614 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 14 00:44:03.830013 kubelet[1614]: E0514 00:44:03.829471 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:03.830555 kubelet[1614]: E0514 00:44:03.830507 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:03.832241 kubelet[1614]: E0514 00:44:03.832217 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:04.314000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:04.314000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4001906b80 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:44:04.314000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:44:04.314000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:04.314000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=40047a37a0 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:44:04.314000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:44:04.315000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:04.315000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005bcec30 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:44:04.315000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:44:04.315000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:04.315000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40046a2450 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:44:04.315000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:44:04.333000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:04.333000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=80 a1=40046855c0 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:44:04.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:44:04.333000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:04.333000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=80 a1=4004bb2360 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:44:04.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:44:04.472430 kubelet[1614]: I0514 00:44:04.472399 1614 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 14 00:44:04.472805 kubelet[1614]: E0514 00:44:04.472788 1614 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 14 00:44:04.481292 kubelet[1614]: E0514 00:44:04.481263 1614 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:44:04.514658 kubelet[1614]: E0514 00:44:04.514541 1614 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{localhost.183f3e15558db4eb default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-14 00:44:01.793627371 +0000 UTC m=+0.549548279,LastTimestamp:2025-05-14 00:44:01.793627371 +0000 UTC m=+0.549548279,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 14 00:44:04.581673 kubelet[1614]: E0514 00:44:04.581576 1614 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:44:04.682051 kubelet[1614]: E0514 00:44:04.682020 1614 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:44:04.782427 kubelet[1614]: E0514 00:44:04.782390 1614 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:44:04.843446 kubelet[1614]: E0514 00:44:04.843345 1614 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 14 00:44:04.843565 kubelet[1614]: E0514 00:44:04.843507 1614 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:05.221000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:05.221000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400018b800 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:05.221000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:44:05.222000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:05.222000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400049f580 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:05.222000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:44:05.789567 kubelet[1614]: I0514 00:44:05.789526 1614 apiserver.go:52] "Watching apiserver" May 14 00:44:05.798703 kubelet[1614]: I0514 00:44:05.798679 1614 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 14 00:44:06.193521 systemd[1]: Reloading. May 14 00:44:06.247821 /usr/lib/systemd/system-generators/torcx-generator[1915]: time="2025-05-14T00:44:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 14 00:44:06.248318 /usr/lib/systemd/system-generators/torcx-generator[1915]: time="2025-05-14T00:44:06Z" level=info msg="torcx already run" May 14 00:44:06.309193 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 14 00:44:06.309211 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 14 00:44:06.324693 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 14 00:44:06.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.384000 audit: BPF prog-id=79 op=LOAD May 14 00:44:06.384000 audit: BPF prog-id=55 op=UNLOAD May 14 00:44:06.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.385000 audit: BPF prog-id=80 op=LOAD May 14 00:44:06.385000 audit: BPF prog-id=40 op=UNLOAD May 14 00:44:06.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.386000 audit: BPF prog-id=81 op=LOAD May 14 00:44:06.386000 audit: BPF prog-id=59 op=UNLOAD May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit: BPF prog-id=82 op=LOAD May 14 00:44:06.387000 audit: BPF prog-id=56 op=UNLOAD May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit: BPF prog-id=83 op=LOAD May 14 00:44:06.388000 audit: BPF prog-id=41 op=UNLOAD May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit: BPF prog-id=84 op=LOAD May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.388000 audit: BPF prog-id=85 op=LOAD May 14 00:44:06.388000 audit: BPF prog-id=42 op=UNLOAD May 14 00:44:06.388000 audit: BPF prog-id=43 op=UNLOAD May 14 00:44:06.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.389000 audit: BPF prog-id=86 op=LOAD May 14 00:44:06.389000 audit: BPF prog-id=44 op=UNLOAD May 14 00:44:06.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit: BPF prog-id=87 op=LOAD May 14 00:44:06.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.390000 audit: BPF prog-id=88 op=LOAD May 14 00:44:06.390000 audit: BPF prog-id=45 op=UNLOAD May 14 00:44:06.390000 audit: BPF prog-id=46 op=UNLOAD May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit: BPF prog-id=89 op=LOAD May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit: BPF prog-id=90 op=LOAD May 14 00:44:06.391000 audit: BPF prog-id=47 op=UNLOAD May 14 00:44:06.391000 audit: BPF prog-id=48 op=UNLOAD May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.391000 audit: BPF prog-id=91 op=LOAD May 14 00:44:06.391000 audit: BPF prog-id=67 op=UNLOAD May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit: BPF prog-id=92 op=LOAD May 14 00:44:06.392000 audit: BPF prog-id=49 op=UNLOAD May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit: BPF prog-id=93 op=LOAD May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.392000 audit: BPF prog-id=94 op=LOAD May 14 00:44:06.392000 audit: BPF prog-id=50 op=UNLOAD May 14 00:44:06.392000 audit: BPF prog-id=51 op=UNLOAD May 14 00:44:06.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit: BPF prog-id=95 op=LOAD May 14 00:44:06.394000 audit: BPF prog-id=75 op=UNLOAD May 14 00:44:06.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.394000 audit: BPF prog-id=96 op=LOAD May 14 00:44:06.394000 audit: BPF prog-id=71 op=UNLOAD May 14 00:44:06.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit: BPF prog-id=97 op=LOAD May 14 00:44:06.396000 audit: BPF prog-id=52 op=UNLOAD May 14 00:44:06.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.396000 audit: BPF prog-id=98 op=LOAD May 14 00:44:06.396000 audit: BPF prog-id=53 op=UNLOAD May 14 00:44:06.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.397000 audit: BPF prog-id=99 op=LOAD May 14 00:44:06.397000 audit: BPF prog-id=54 op=UNLOAD May 14 00:44:06.408568 systemd[1]: Stopping kubelet.service... May 14 00:44:06.435357 systemd[1]: kubelet.service: Deactivated successfully. May 14 00:44:06.435676 systemd[1]: Stopped kubelet.service. May 14 00:44:06.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:06.438135 systemd[1]: Starting kubelet.service... May 14 00:44:06.520365 systemd[1]: Started kubelet.service. May 14 00:44:06.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:06.553673 kubelet[1957]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:44:06.553673 kubelet[1957]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 14 00:44:06.553673 kubelet[1957]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 14 00:44:06.554034 kubelet[1957]: I0514 00:44:06.553724 1957 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 14 00:44:06.560669 kubelet[1957]: I0514 00:44:06.560620 1957 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 14 00:44:06.560776 kubelet[1957]: I0514 00:44:06.560764 1957 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 14 00:44:06.561020 kubelet[1957]: I0514 00:44:06.560993 1957 server.go:929] "Client rotation is on, will bootstrap in background" May 14 00:44:06.562242 kubelet[1957]: I0514 00:44:06.562219 1957 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 14 00:44:06.564025 kubelet[1957]: I0514 00:44:06.563995 1957 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 14 00:44:06.566843 kubelet[1957]: E0514 00:44:06.566812 1957 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 14 00:44:06.566843 kubelet[1957]: I0514 00:44:06.566839 1957 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 14 00:44:06.569510 kubelet[1957]: I0514 00:44:06.569007 1957 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 14 00:44:06.569510 kubelet[1957]: I0514 00:44:06.569102 1957 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 14 00:44:06.569510 kubelet[1957]: I0514 00:44:06.569198 1957 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 14 00:44:06.569510 kubelet[1957]: I0514 00:44:06.569217 1957 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 14 00:44:06.569697 kubelet[1957]: I0514 00:44:06.569370 1957 topology_manager.go:138] "Creating topology manager with none policy" May 14 00:44:06.569697 kubelet[1957]: I0514 00:44:06.569381 1957 container_manager_linux.go:300] "Creating device plugin manager" May 14 00:44:06.569697 kubelet[1957]: I0514 00:44:06.569410 1957 state_mem.go:36] "Initialized new in-memory state store" May 14 00:44:06.569697 kubelet[1957]: I0514 00:44:06.569493 1957 kubelet.go:408] "Attempting to sync node with API server" May 14 00:44:06.569697 kubelet[1957]: I0514 00:44:06.569503 1957 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 14 00:44:06.569697 kubelet[1957]: I0514 00:44:06.569522 1957 kubelet.go:314] "Adding apiserver pod source" May 14 00:44:06.569697 kubelet[1957]: I0514 00:44:06.569532 1957 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 14 00:44:06.570150 kubelet[1957]: I0514 00:44:06.570123 1957 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 14 00:44:06.570949 kubelet[1957]: I0514 00:44:06.570927 1957 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 14 00:44:06.571321 kubelet[1957]: I0514 00:44:06.571286 1957 server.go:1269] "Started kubelet" May 14 00:44:06.571832 kubelet[1957]: I0514 00:44:06.571783 1957 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 14 00:44:06.572000 audit[1957]: AVC avc: denied { mac_admin } for pid=1957 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.572000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:44:06.572000 audit[1957]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400066b230 a1=4000d4e3a8 a2=400066b200 a3=25 items=0 ppid=1 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:06.572000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:44:06.572000 audit[1957]: AVC avc: denied { mac_admin } for pid=1957 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.572000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:44:06.572000 audit[1957]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400036d320 a1=4000d4e3c0 a2=400066b2c0 a3=25 items=0 ppid=1 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:06.572000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:44:06.573363 kubelet[1957]: I0514 00:44:06.572923 1957 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 14 00:44:06.573363 kubelet[1957]: I0514 00:44:06.572972 1957 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 14 00:44:06.573363 kubelet[1957]: I0514 00:44:06.573000 1957 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 14 00:44:06.574591 kubelet[1957]: I0514 00:44:06.574380 1957 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 14 00:44:06.580572 kubelet[1957]: I0514 00:44:06.580539 1957 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 14 00:44:06.583132 kubelet[1957]: I0514 00:44:06.582130 1957 volume_manager.go:289] "Starting Kubelet Volume Manager" May 14 00:44:06.583132 kubelet[1957]: E0514 00:44:06.582360 1957 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 14 00:44:06.583132 kubelet[1957]: I0514 00:44:06.582981 1957 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 14 00:44:06.583598 kubelet[1957]: I0514 00:44:06.583244 1957 reconciler.go:26] "Reconciler: start to sync state" May 14 00:44:06.587236 kubelet[1957]: I0514 00:44:06.587202 1957 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 14 00:44:06.588529 kubelet[1957]: I0514 00:44:06.588506 1957 server.go:460] "Adding debug handlers to kubelet server" May 14 00:44:06.606380 kubelet[1957]: E0514 00:44:06.606353 1957 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 14 00:44:06.606537 kubelet[1957]: I0514 00:44:06.606511 1957 factory.go:221] Registration of the containerd container factory successfully May 14 00:44:06.606565 kubelet[1957]: I0514 00:44:06.606556 1957 factory.go:221] Registration of the systemd container factory successfully May 14 00:44:06.609092 kubelet[1957]: I0514 00:44:06.609060 1957 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 14 00:44:06.611896 kubelet[1957]: I0514 00:44:06.611842 1957 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 14 00:44:06.612776 kubelet[1957]: I0514 00:44:06.612759 1957 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 14 00:44:06.612882 kubelet[1957]: I0514 00:44:06.612871 1957 status_manager.go:217] "Starting to sync pod status with apiserver" May 14 00:44:06.612947 kubelet[1957]: I0514 00:44:06.612936 1957 kubelet.go:2321] "Starting kubelet main sync loop" May 14 00:44:06.613044 kubelet[1957]: E0514 00:44:06.613024 1957 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 14 00:44:06.640575 kubelet[1957]: I0514 00:44:06.640550 1957 cpu_manager.go:214] "Starting CPU manager" policy="none" May 14 00:44:06.640575 kubelet[1957]: I0514 00:44:06.640570 1957 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 14 00:44:06.640692 kubelet[1957]: I0514 00:44:06.640589 1957 state_mem.go:36] "Initialized new in-memory state store" May 14 00:44:06.640735 kubelet[1957]: I0514 00:44:06.640723 1957 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 14 00:44:06.640762 kubelet[1957]: I0514 00:44:06.640734 1957 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 14 00:44:06.640762 kubelet[1957]: I0514 00:44:06.640750 1957 policy_none.go:49] "None policy: Start" May 14 00:44:06.641393 kubelet[1957]: I0514 00:44:06.641378 1957 memory_manager.go:170] "Starting memorymanager" policy="None" May 14 00:44:06.641482 kubelet[1957]: I0514 00:44:06.641471 1957 state_mem.go:35] "Initializing new in-memory state store" May 14 00:44:06.641653 kubelet[1957]: I0514 00:44:06.641637 1957 state_mem.go:75] "Updated machine memory state" May 14 00:44:06.645650 kubelet[1957]: I0514 00:44:06.645611 1957 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 14 00:44:06.644000 audit[1957]: AVC avc: denied { mac_admin } for pid=1957 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:06.644000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 14 00:44:06.644000 audit[1957]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006d3200 a1=4000ed8de0 a2=40006d31d0 a3=25 items=0 ppid=1 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:06.644000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 14 00:44:06.645944 kubelet[1957]: I0514 00:44:06.645675 1957 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 14 00:44:06.645944 kubelet[1957]: I0514 00:44:06.645813 1957 eviction_manager.go:189] "Eviction manager: starting control loop" May 14 00:44:06.645944 kubelet[1957]: I0514 00:44:06.645824 1957 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 14 00:44:06.647634 kubelet[1957]: I0514 00:44:06.646214 1957 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 14 00:44:06.749214 kubelet[1957]: I0514 00:44:06.749168 1957 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 14 00:44:06.756575 kubelet[1957]: I0514 00:44:06.756313 1957 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 14 00:44:06.756575 kubelet[1957]: I0514 00:44:06.756400 1957 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 14 00:44:06.884412 kubelet[1957]: I0514 00:44:06.884350 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/62cf41b304f2e52e8d37e49332e2450b-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"62cf41b304f2e52e8d37e49332e2450b\") " pod="kube-system/kube-apiserver-localhost" May 14 00:44:06.884574 kubelet[1957]: I0514 00:44:06.884415 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:06.884574 kubelet[1957]: I0514 00:44:06.884460 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:06.884574 kubelet[1957]: I0514 00:44:06.884478 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/62cf41b304f2e52e8d37e49332e2450b-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"62cf41b304f2e52e8d37e49332e2450b\") " pod="kube-system/kube-apiserver-localhost" May 14 00:44:06.884574 kubelet[1957]: I0514 00:44:06.884493 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:06.884574 kubelet[1957]: I0514 00:44:06.884509 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:06.884754 kubelet[1957]: I0514 00:44:06.884524 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 14 00:44:06.884754 kubelet[1957]: I0514 00:44:06.884538 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 14 00:44:06.884754 kubelet[1957]: I0514 00:44:06.884552 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/62cf41b304f2e52e8d37e49332e2450b-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"62cf41b304f2e52e8d37e49332e2450b\") " pod="kube-system/kube-apiserver-localhost" May 14 00:44:07.021053 kubelet[1957]: E0514 00:44:07.021010 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:07.021196 kubelet[1957]: E0514 00:44:07.021115 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:07.021243 kubelet[1957]: E0514 00:44:07.021026 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:07.570101 kubelet[1957]: I0514 00:44:07.570067 1957 apiserver.go:52] "Watching apiserver" May 14 00:44:07.583627 kubelet[1957]: I0514 00:44:07.583601 1957 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 14 00:44:07.628273 kubelet[1957]: E0514 00:44:07.628247 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:07.628930 kubelet[1957]: E0514 00:44:07.628909 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:07.633128 kubelet[1957]: E0514 00:44:07.633105 1957 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 14 00:44:07.633328 kubelet[1957]: E0514 00:44:07.633312 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:07.650591 kubelet[1957]: I0514 00:44:07.650532 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.6505207990000001 podStartE2EDuration="1.650520799s" podCreationTimestamp="2025-05-14 00:44:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:44:07.644311437 +0000 UTC m=+1.121110557" watchObservedRunningTime="2025-05-14 00:44:07.650520799 +0000 UTC m=+1.127319919" May 14 00:44:07.656757 kubelet[1957]: I0514 00:44:07.656695 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.656686178 podStartE2EDuration="1.656686178s" podCreationTimestamp="2025-05-14 00:44:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:44:07.650602921 +0000 UTC m=+1.127402121" watchObservedRunningTime="2025-05-14 00:44:07.656686178 +0000 UTC m=+1.133485298" May 14 00:44:07.657021 kubelet[1957]: I0514 00:44:07.656984 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.656976808 podStartE2EDuration="1.656976808s" podCreationTimestamp="2025-05-14 00:44:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:44:07.656919978 +0000 UTC m=+1.133719098" watchObservedRunningTime="2025-05-14 00:44:07.656976808 +0000 UTC m=+1.133775928" May 14 00:44:08.629702 kubelet[1957]: E0514 00:44:08.629660 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:11.381516 sudo[1357]: pam_unix(sudo:session): session closed for user root May 14 00:44:11.380000 audit[1357]: USER_END pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:44:11.382126 kernel: kauditd_printk_skb: 636 callbacks suppressed May 14 00:44:11.382175 kernel: audit: type=1106 audit(1747183451.380:786): pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:44:11.380000 audit[1357]: CRED_DISP pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:44:11.384587 sshd[1353]: pam_unix(sshd:session): session closed for user core May 14 00:44:11.386212 kernel: audit: type=1104 audit(1747183451.380:787): pid=1357 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 14 00:44:11.386000 audit[1353]: USER_END pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:11.390081 systemd[1]: sshd@6-10.0.0.73:22-10.0.0.1:38442.service: Deactivated successfully. May 14 00:44:11.386000 audit[1353]: CRED_DISP pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:11.390794 systemd[1]: session-7.scope: Deactivated successfully. May 14 00:44:11.390977 systemd[1]: session-7.scope: Consumed 6.821s CPU time. May 14 00:44:11.391597 systemd-logind[1209]: Session 7 logged out. Waiting for processes to exit. May 14 00:44:11.392253 kernel: audit: type=1106 audit(1747183451.386:788): pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:11.392304 kernel: audit: type=1104 audit(1747183451.386:789): pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:11.392328 kernel: audit: type=1131 audit(1747183451.389:790): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.73:22-10.0.0.1:38442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:11.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.73:22-10.0.0.1:38442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:11.392348 systemd-logind[1209]: Removed session 7. May 14 00:44:11.498000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:11.498000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000dd71e0 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:11.504517 kernel: audit: type=1400 audit(1747183451.498:791): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:11.504564 kernel: audit: type=1300 audit(1747183451.498:791): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000dd71e0 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:11.504606 kernel: audit: type=1327 audit(1747183451.498:791): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:44:11.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:44:11.498000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:11.508990 kernel: audit: type=1400 audit(1747183451.498:792): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:11.509027 kernel: audit: type=1300 audit(1747183451.498:792): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c8e2c0 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:11.498000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c8e2c0 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:11.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:44:11.499000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:11.499000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001012aa0 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:11.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:44:11.499000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:44:11.499000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b65700 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:11.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:44:11.699000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 14 00:44:11.699000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40009e0a80 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:44:11.699000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:44:13.311724 kubelet[1957]: I0514 00:44:13.311693 1957 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 14 00:44:13.312127 env[1221]: time="2025-05-14T00:44:13.312083795Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 14 00:44:13.312454 kubelet[1957]: I0514 00:44:13.312433 1957 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 14 00:44:14.026093 kubelet[1957]: E0514 00:44:14.026052 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:14.370673 systemd[1]: Created slice kubepods-besteffort-pod575361e7_20cd_4f1f_bcf5_2c65883231f3.slice. May 14 00:44:14.378291 kubelet[1957]: E0514 00:44:14.378249 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:14.431673 kubelet[1957]: I0514 00:44:14.431629 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/575361e7-20cd-4f1f-bcf5-2c65883231f3-kube-proxy\") pod \"kube-proxy-lb557\" (UID: \"575361e7-20cd-4f1f-bcf5-2c65883231f3\") " pod="kube-system/kube-proxy-lb557" May 14 00:44:14.431928 kubelet[1957]: I0514 00:44:14.431908 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/575361e7-20cd-4f1f-bcf5-2c65883231f3-xtables-lock\") pod \"kube-proxy-lb557\" (UID: \"575361e7-20cd-4f1f-bcf5-2c65883231f3\") " pod="kube-system/kube-proxy-lb557" May 14 00:44:14.432041 kubelet[1957]: I0514 00:44:14.432024 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/575361e7-20cd-4f1f-bcf5-2c65883231f3-lib-modules\") pod \"kube-proxy-lb557\" (UID: \"575361e7-20cd-4f1f-bcf5-2c65883231f3\") " pod="kube-system/kube-proxy-lb557" May 14 00:44:14.432132 kubelet[1957]: I0514 00:44:14.432115 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-46pbg\" (UniqueName: \"kubernetes.io/projected/575361e7-20cd-4f1f-bcf5-2c65883231f3-kube-api-access-46pbg\") pod \"kube-proxy-lb557\" (UID: \"575361e7-20cd-4f1f-bcf5-2c65883231f3\") " pod="kube-system/kube-proxy-lb557" May 14 00:44:14.484986 systemd[1]: Created slice kubepods-besteffort-pod86a77293_e927_4816_89fa_feec93ca1591.slice. May 14 00:44:14.532381 kubelet[1957]: I0514 00:44:14.532325 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/86a77293-e927-4816-89fa-feec93ca1591-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-wdlg8\" (UID: \"86a77293-e927-4816-89fa-feec93ca1591\") " pod="tigera-operator/tigera-operator-6f6897fdc5-wdlg8" May 14 00:44:14.532540 kubelet[1957]: I0514 00:44:14.532432 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cvjkt\" (UniqueName: \"kubernetes.io/projected/86a77293-e927-4816-89fa-feec93ca1591-kube-api-access-cvjkt\") pod \"tigera-operator-6f6897fdc5-wdlg8\" (UID: \"86a77293-e927-4816-89fa-feec93ca1591\") " pod="tigera-operator/tigera-operator-6f6897fdc5-wdlg8" May 14 00:44:14.540098 kubelet[1957]: I0514 00:44:14.540063 1957 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 14 00:44:14.636757 kubelet[1957]: E0514 00:44:14.636654 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:14.637273 kubelet[1957]: E0514 00:44:14.637132 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:14.678398 kubelet[1957]: E0514 00:44:14.678366 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:14.679265 env[1221]: time="2025-05-14T00:44:14.679216802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lb557,Uid:575361e7-20cd-4f1f-bcf5-2c65883231f3,Namespace:kube-system,Attempt:0,}" May 14 00:44:14.692193 env[1221]: time="2025-05-14T00:44:14.692117433Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:14.692284 env[1221]: time="2025-05-14T00:44:14.692200701Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:14.692284 env[1221]: time="2025-05-14T00:44:14.692227230Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:14.692492 env[1221]: time="2025-05-14T00:44:14.692452266Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ac8fbbf0a01dd3c1fb716ac935f33503c1f1f38b8dd7952b472915befc1b780 pid=2055 runtime=io.containerd.runc.v2 May 14 00:44:14.705254 systemd[1]: Started cri-containerd-4ac8fbbf0a01dd3c1fb716ac935f33503c1f1f38b8dd7952b472915befc1b780.scope. May 14 00:44:14.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.734000 audit: BPF prog-id=100 op=LOAD May 14 00:44:14.735000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2055 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633866626266306130316464336331666237313661633933356633 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2055 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633866626266306130316464336331666237313661633933356633 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.735000 audit: BPF prog-id=101 op=LOAD May 14 00:44:14.735000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2055 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633866626266306130316464336331666237313661633933356633 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.736000 audit: BPF prog-id=102 op=LOAD May 14 00:44:14.736000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2055 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633866626266306130316464336331666237313661633933356633 May 14 00:44:14.737000 audit: BPF prog-id=102 op=UNLOAD May 14 00:44:14.737000 audit: BPF prog-id=101 op=UNLOAD May 14 00:44:14.737000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.737000 audit: BPF prog-id=103 op=LOAD May 14 00:44:14.737000 audit[2064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2055 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633866626266306130316464336331666237313661633933356633 May 14 00:44:14.748546 env[1221]: time="2025-05-14T00:44:14.748508576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lb557,Uid:575361e7-20cd-4f1f-bcf5-2c65883231f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"4ac8fbbf0a01dd3c1fb716ac935f33503c1f1f38b8dd7952b472915befc1b780\"" May 14 00:44:14.749269 kubelet[1957]: E0514 00:44:14.749243 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:14.754209 env[1221]: time="2025-05-14T00:44:14.753481813Z" level=info msg="CreateContainer within sandbox \"4ac8fbbf0a01dd3c1fb716ac935f33503c1f1f38b8dd7952b472915befc1b780\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 14 00:44:14.766625 env[1221]: time="2025-05-14T00:44:14.766580192Z" level=info msg="CreateContainer within sandbox \"4ac8fbbf0a01dd3c1fb716ac935f33503c1f1f38b8dd7952b472915befc1b780\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"323dafbe42632b757540abfc179a4ec8c1773c29caaee3c6ca4be90c9af7a51d\"" May 14 00:44:14.768108 env[1221]: time="2025-05-14T00:44:14.767287990Z" level=info msg="StartContainer for \"323dafbe42632b757540abfc179a4ec8c1773c29caaee3c6ca4be90c9af7a51d\"" May 14 00:44:14.782247 systemd[1]: Started cri-containerd-323dafbe42632b757540abfc179a4ec8c1773c29caaee3c6ca4be90c9af7a51d.scope. May 14 00:44:14.788500 env[1221]: time="2025-05-14T00:44:14.788456531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-wdlg8,Uid:86a77293-e927-4816-89fa-feec93ca1591,Namespace:tigera-operator,Attempt:0,}" May 14 00:44:14.809506 env[1221]: time="2025-05-14T00:44:14.808677672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:14.809506 env[1221]: time="2025-05-14T00:44:14.808744695Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:14.809506 env[1221]: time="2025-05-14T00:44:14.808754738Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:14.809506 env[1221]: time="2025-05-14T00:44:14.808988337Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e04f23858e1b85e37b67cae78a2ca343a95787df360d380ba17261b9a50bf0bc pid=2120 runtime=io.containerd.runc.v2 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2055 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332336461666265343236333262373537353430616266633137396134 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.810000 audit: BPF prog-id=104 op=LOAD May 14 00:44:14.810000 audit[2095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2055 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332336461666265343236333262373537353430616266633137396134 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit: BPF prog-id=105 op=LOAD May 14 00:44:14.811000 audit[2095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2055 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332336461666265343236333262373537353430616266633137396134 May 14 00:44:14.811000 audit: BPF prog-id=105 op=UNLOAD May 14 00:44:14.811000 audit: BPF prog-id=104 op=UNLOAD May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.811000 audit: BPF prog-id=106 op=LOAD May 14 00:44:14.811000 audit[2095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2055 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332336461666265343236333262373537353430616266633137396134 May 14 00:44:14.821508 systemd[1]: Started cri-containerd-e04f23858e1b85e37b67cae78a2ca343a95787df360d380ba17261b9a50bf0bc.scope. May 14 00:44:14.839974 env[1221]: time="2025-05-14T00:44:14.839889361Z" level=info msg="StartContainer for \"323dafbe42632b757540abfc179a4ec8c1773c29caaee3c6ca4be90c9af7a51d\" returns successfully" May 14 00:44:14.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit: BPF prog-id=107 op=LOAD May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530346632333835386531623835653337623637636165373861326361 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530346632333835386531623835653337623637636165373861326361 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit: BPF prog-id=108 op=LOAD May 14 00:44:14.858000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530346632333835386531623835653337623637636165373861326361 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit: BPF prog-id=109 op=LOAD May 14 00:44:14.858000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530346632333835386531623835653337623637636165373861326361 May 14 00:44:14.858000 audit: BPF prog-id=109 op=UNLOAD May 14 00:44:14.858000 audit: BPF prog-id=108 op=UNLOAD May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:14.858000 audit: BPF prog-id=110 op=LOAD May 14 00:44:14.858000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2120 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:14.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530346632333835386531623835653337623637636165373861326361 May 14 00:44:14.879175 env[1221]: time="2025-05-14T00:44:14.879134359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-wdlg8,Uid:86a77293-e927-4816-89fa-feec93ca1591,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e04f23858e1b85e37b67cae78a2ca343a95787df360d380ba17261b9a50bf0bc\"" May 14 00:44:14.880807 env[1221]: time="2025-05-14T00:44:14.880769231Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 14 00:44:15.036000 audit[2198]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.036000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd2b9040 a2=0 a3=1 items=0 ppid=2106 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 14 00:44:15.037000 audit[2197]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.037000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6c1b7f0 a2=0 a3=1 items=0 ppid=2106 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 14 00:44:15.038000 audit[2200]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.038000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd39277e0 a2=0 a3=1 items=0 ppid=2106 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 14 00:44:15.041000 audit[2201]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.041000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcca90750 a2=0 a3=1 items=0 ppid=2106 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 14 00:44:15.042000 audit[2202]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.042000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc17c5370 a2=0 a3=1 items=0 ppid=2106 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 14 00:44:15.043000 audit[2203]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.043000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb900e20 a2=0 a3=1 items=0 ppid=2106 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 14 00:44:15.140000 audit[2205]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.140000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc95022d0 a2=0 a3=1 items=0 ppid=2106 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 14 00:44:15.144000 audit[2207]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.144000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff3a391b0 a2=0 a3=1 items=0 ppid=2106 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.144000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 14 00:44:15.150000 audit[2210]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.150000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe50eef20 a2=0 a3=1 items=0 ppid=2106 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 14 00:44:15.151000 audit[2211]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.151000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff8f6b40 a2=0 a3=1 items=0 ppid=2106 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 14 00:44:15.153000 audit[2213]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.153000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf8aa040 a2=0 a3=1 items=0 ppid=2106 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 14 00:44:15.154000 audit[2214]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.154000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda286600 a2=0 a3=1 items=0 ppid=2106 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 14 00:44:15.156000 audit[2216]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.156000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe9d51be0 a2=0 a3=1 items=0 ppid=2106 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 14 00:44:15.161000 audit[2219]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.161000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe85459b0 a2=0 a3=1 items=0 ppid=2106 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 14 00:44:15.162000 audit[2220]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.162000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb7edd00 a2=0 a3=1 items=0 ppid=2106 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 14 00:44:15.164000 audit[2222]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.164000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee217e40 a2=0 a3=1 items=0 ppid=2106 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 14 00:44:15.165000 audit[2223]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.165000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd998b850 a2=0 a3=1 items=0 ppid=2106 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 14 00:44:15.168000 audit[2225]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.168000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe9c1850 a2=0 a3=1 items=0 ppid=2106 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:44:15.171000 audit[2228]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.171000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff5d822c0 a2=0 a3=1 items=0 ppid=2106 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:44:15.175000 audit[2231]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.175000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6762f70 a2=0 a3=1 items=0 ppid=2106 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 14 00:44:15.176000 audit[2232]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.176000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe8e4cb60 a2=0 a3=1 items=0 ppid=2106 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 14 00:44:15.178000 audit[2234]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.178000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc386b040 a2=0 a3=1 items=0 ppid=2106 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:44:15.182000 audit[2237]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.182000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd263f510 a2=0 a3=1 items=0 ppid=2106 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:44:15.183000 audit[2238]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.183000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcac5f8c0 a2=0 a3=1 items=0 ppid=2106 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 14 00:44:15.185000 audit[2240]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 14 00:44:15.185000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffffdaa500 a2=0 a3=1 items=0 ppid=2106 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 14 00:44:15.206000 audit[2246]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:15.206000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffdb3699a0 a2=0 a3=1 items=0 ppid=2106 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:15.216000 audit[2246]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:15.216000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffdb3699a0 a2=0 a3=1 items=0 ppid=2106 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:15.217000 audit[2251]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.217000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff369d9a0 a2=0 a3=1 items=0 ppid=2106 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 14 00:44:15.219000 audit[2253]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.219000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc4ecff00 a2=0 a3=1 items=0 ppid=2106 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 14 00:44:15.222000 audit[2256]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.222000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc2fa6d90 a2=0 a3=1 items=0 ppid=2106 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 14 00:44:15.223000 audit[2257]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.223000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff63cce60 a2=0 a3=1 items=0 ppid=2106 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 14 00:44:15.226000 audit[2259]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.226000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc91ad7f0 a2=0 a3=1 items=0 ppid=2106 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 14 00:44:15.227000 audit[2260]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.227000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff82a2380 a2=0 a3=1 items=0 ppid=2106 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 14 00:44:15.229000 audit[2262]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.229000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe8b49f10 a2=0 a3=1 items=0 ppid=2106 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 14 00:44:15.232000 audit[2265]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.232000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd1015b60 a2=0 a3=1 items=0 ppid=2106 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 14 00:44:15.233000 audit[2266]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.233000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff70dce30 a2=0 a3=1 items=0 ppid=2106 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 14 00:44:15.236000 audit[2268]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.236000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9232010 a2=0 a3=1 items=0 ppid=2106 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 14 00:44:15.239000 audit[2269]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.239000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc05ff8f0 a2=0 a3=1 items=0 ppid=2106 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 14 00:44:15.241000 audit[2271]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.241000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee8983c0 a2=0 a3=1 items=0 ppid=2106 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 14 00:44:15.244000 audit[2274]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.244000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff731fd90 a2=0 a3=1 items=0 ppid=2106 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 14 00:44:15.248000 audit[2277]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.248000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd2851a30 a2=0 a3=1 items=0 ppid=2106 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 14 00:44:15.249000 audit[2278]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.249000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc03abbe0 a2=0 a3=1 items=0 ppid=2106 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 14 00:44:15.251000 audit[2280]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.251000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc9cd7df0 a2=0 a3=1 items=0 ppid=2106 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:44:15.254000 audit[2283]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.254000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd7e9b8a0 a2=0 a3=1 items=0 ppid=2106 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 14 00:44:15.255000 audit[2284]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.255000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8aa0a30 a2=0 a3=1 items=0 ppid=2106 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 14 00:44:15.257000 audit[2286]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.257000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe68ac9a0 a2=0 a3=1 items=0 ppid=2106 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 14 00:44:15.258000 audit[2287]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.258000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9dc5550 a2=0 a3=1 items=0 ppid=2106 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 14 00:44:15.261000 audit[2289]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.261000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffe7b3250 a2=0 a3=1 items=0 ppid=2106 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:44:15.264000 audit[2292]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 14 00:44:15.264000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe79dc0d0 a2=0 a3=1 items=0 ppid=2106 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 14 00:44:15.267000 audit[2294]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 14 00:44:15.267000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffffe3afc0 a2=0 a3=1 items=0 ppid=2106 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.267000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:15.268000 audit[2294]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 14 00:44:15.268000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffffe3afc0 a2=0 a3=1 items=0 ppid=2106 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:15.268000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:15.546224 systemd[1]: run-containerd-runc-k8s.io-4ac8fbbf0a01dd3c1fb716ac935f33503c1f1f38b8dd7952b472915befc1b780-runc.QJTzyC.mount: Deactivated successfully. May 14 00:44:15.645815 kubelet[1957]: E0514 00:44:15.645292 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:15.668182 kubelet[1957]: I0514 00:44:15.667968 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-lb557" podStartSLOduration=1.667941771 podStartE2EDuration="1.667941771s" podCreationTimestamp="2025-05-14 00:44:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:44:15.667903439 +0000 UTC m=+9.144702559" watchObservedRunningTime="2025-05-14 00:44:15.667941771 +0000 UTC m=+9.144740891" May 14 00:44:16.038231 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3548357496.mount: Deactivated successfully. May 14 00:44:16.499424 env[1221]: time="2025-05-14T00:44:16.499295653Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:16.500888 env[1221]: time="2025-05-14T00:44:16.500842762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:16.502497 env[1221]: time="2025-05-14T00:44:16.502458611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:16.506569 env[1221]: time="2025-05-14T00:44:16.506528644Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:16.508060 env[1221]: time="2025-05-14T00:44:16.508020656Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 14 00:44:16.510909 env[1221]: time="2025-05-14T00:44:16.510833107Z" level=info msg="CreateContainer within sandbox \"e04f23858e1b85e37b67cae78a2ca343a95787df360d380ba17261b9a50bf0bc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 14 00:44:16.519358 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3943811060.mount: Deactivated successfully. May 14 00:44:16.520300 env[1221]: time="2025-05-14T00:44:16.520267404Z" level=info msg="CreateContainer within sandbox \"e04f23858e1b85e37b67cae78a2ca343a95787df360d380ba17261b9a50bf0bc\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"623f175479bfbc36173f36319759555942e289d2a39f079793cc7e7fd5fa0b43\"" May 14 00:44:16.520741 env[1221]: time="2025-05-14T00:44:16.520715780Z" level=info msg="StartContainer for \"623f175479bfbc36173f36319759555942e289d2a39f079793cc7e7fd5fa0b43\"" May 14 00:44:16.543076 systemd[1]: Started cri-containerd-623f175479bfbc36173f36319759555942e289d2a39f079793cc7e7fd5fa0b43.scope. May 14 00:44:16.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.566419 kernel: kauditd_printk_skb: 320 callbacks suppressed May 14 00:44:16.566460 kernel: audit: type=1400 audit(1747183456.563:889): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.566478 kernel: audit: type=1400 audit(1747183456.563:890): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.570293 kernel: audit: type=1400 audit(1747183456.563:891): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.570353 kernel: audit: type=1400 audit(1747183456.563:892): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.572274 kernel: audit: type=1400 audit(1747183456.563:893): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.574132 kernel: audit: type=1400 audit(1747183456.563:894): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.575993 kernel: audit: type=1400 audit(1747183456.563:895): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.577912 kernel: audit: type=1400 audit(1747183456.563:896): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.581614 kernel: audit: type=1400 audit(1747183456.563:897): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.581681 kernel: audit: type=1400 audit(1747183456.563:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.563000 audit: BPF prog-id=111 op=LOAD May 14 00:44:16.568000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2120 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:16.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632336631373534373962666263333631373366333633313937353935 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2120 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:16.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632336631373534373962666263333631373366333633313937353935 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.568000 audit: BPF prog-id=112 op=LOAD May 14 00:44:16.568000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2120 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:16.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632336631373534373962666263333631373366333633313937353935 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.569000 audit: BPF prog-id=113 op=LOAD May 14 00:44:16.569000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2120 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:16.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632336631373534373962666263333631373366333633313937353935 May 14 00:44:16.571000 audit: BPF prog-id=113 op=UNLOAD May 14 00:44:16.571000 audit: BPF prog-id=112 op=UNLOAD May 14 00:44:16.571000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:16.571000 audit: BPF prog-id=114 op=LOAD May 14 00:44:16.571000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2120 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:16.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632336631373534373962666263333631373366333633313937353935 May 14 00:44:16.591787 env[1221]: time="2025-05-14T00:44:16.591739489Z" level=info msg="StartContainer for \"623f175479bfbc36173f36319759555942e289d2a39f079793cc7e7fd5fa0b43\" returns successfully" May 14 00:44:16.655883 kubelet[1957]: I0514 00:44:16.655581 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-wdlg8" podStartSLOduration=1.027211324 podStartE2EDuration="2.655554695s" podCreationTimestamp="2025-05-14 00:44:14 +0000 UTC" firstStartedPulling="2025-05-14 00:44:14.880328322 +0000 UTC m=+8.357127442" lastFinishedPulling="2025-05-14 00:44:16.508671693 +0000 UTC m=+9.985470813" observedRunningTime="2025-05-14 00:44:16.655412892 +0000 UTC m=+10.132212012" watchObservedRunningTime="2025-05-14 00:44:16.655554695 +0000 UTC m=+10.132353815" May 14 00:44:16.770881 kubelet[1957]: E0514 00:44:16.770760 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:17.649102 kubelet[1957]: E0514 00:44:17.649071 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:20.136000 audit[2335]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:20.136000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff9404fc0 a2=0 a3=1 items=0 ppid=2106 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:20.150000 audit[2335]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:20.150000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff9404fc0 a2=0 a3=1 items=0 ppid=2106 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:20.166000 audit[2337]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:20.166000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe6312940 a2=0 a3=1 items=0 ppid=2106 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:20.173000 audit[2337]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:20.173000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe6312940 a2=0 a3=1 items=0 ppid=2106 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:20.309119 systemd[1]: Created slice kubepods-besteffort-pod88b0b276_fa4e_40fb_a9db_b2b51e703af8.slice. May 14 00:44:20.364148 kubelet[1957]: W0514 00:44:20.364107 1957 reflector.go:561] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object May 14 00:44:20.364504 kubelet[1957]: E0514 00:44:20.364152 1957 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"cni-config\" is forbidden: User \"system:node:localhost\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 14 00:44:20.366104 systemd[1]: Created slice kubepods-besteffort-pode8a3e02d_8777_433a_8b93_39f4499c15d9.slice. May 14 00:44:20.472354 kubelet[1957]: I0514 00:44:20.472242 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-lib-modules\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.472565 kubelet[1957]: I0514 00:44:20.472531 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-xtables-lock\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.472654 kubelet[1957]: I0514 00:44:20.472641 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e8a3e02d-8777-433a-8b93-39f4499c15d9-node-certs\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.473071 kubelet[1957]: I0514 00:44:20.473049 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-var-lib-calico\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.473269 kubelet[1957]: I0514 00:44:20.473183 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-cni-bin-dir\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.473460 kubelet[1957]: I0514 00:44:20.473442 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-policysync\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.473751 kubelet[1957]: I0514 00:44:20.473731 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-var-run-calico\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.473880 kubelet[1957]: I0514 00:44:20.473866 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-cni-net-dir\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.474072 kubelet[1957]: I0514 00:44:20.474049 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rxftr\" (UniqueName: \"kubernetes.io/projected/e8a3e02d-8777-433a-8b93-39f4499c15d9-kube-api-access-rxftr\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.474228 kubelet[1957]: I0514 00:44:20.474211 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/88b0b276-fa4e-40fb-a9db-b2b51e703af8-tigera-ca-bundle\") pod \"calico-typha-7df99dcfd-t2jl2\" (UID: \"88b0b276-fa4e-40fb-a9db-b2b51e703af8\") " pod="calico-system/calico-typha-7df99dcfd-t2jl2" May 14 00:44:20.474346 kubelet[1957]: I0514 00:44:20.474330 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rsj6s\" (UniqueName: \"kubernetes.io/projected/88b0b276-fa4e-40fb-a9db-b2b51e703af8-kube-api-access-rsj6s\") pod \"calico-typha-7df99dcfd-t2jl2\" (UID: \"88b0b276-fa4e-40fb-a9db-b2b51e703af8\") " pod="calico-system/calico-typha-7df99dcfd-t2jl2" May 14 00:44:20.474438 kubelet[1957]: I0514 00:44:20.474424 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/88b0b276-fa4e-40fb-a9db-b2b51e703af8-typha-certs\") pod \"calico-typha-7df99dcfd-t2jl2\" (UID: \"88b0b276-fa4e-40fb-a9db-b2b51e703af8\") " pod="calico-system/calico-typha-7df99dcfd-t2jl2" May 14 00:44:20.474621 kubelet[1957]: I0514 00:44:20.474601 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-cni-log-dir\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.474747 kubelet[1957]: I0514 00:44:20.474728 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e8a3e02d-8777-433a-8b93-39f4499c15d9-tigera-ca-bundle\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.474864 kubelet[1957]: I0514 00:44:20.474837 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e8a3e02d-8777-433a-8b93-39f4499c15d9-flexvol-driver-host\") pod \"calico-node-hsf4b\" (UID: \"e8a3e02d-8777-433a-8b93-39f4499c15d9\") " pod="calico-system/calico-node-hsf4b" May 14 00:44:20.484386 kubelet[1957]: E0514 00:44:20.484345 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-whxp8" podUID="94f1513e-4d14-4aa4-9b49-2068e28e7d02" May 14 00:44:20.576153 kubelet[1957]: I0514 00:44:20.576114 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/94f1513e-4d14-4aa4-9b49-2068e28e7d02-kubelet-dir\") pod \"csi-node-driver-whxp8\" (UID: \"94f1513e-4d14-4aa4-9b49-2068e28e7d02\") " pod="calico-system/csi-node-driver-whxp8" May 14 00:44:20.576312 kubelet[1957]: I0514 00:44:20.576174 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/94f1513e-4d14-4aa4-9b49-2068e28e7d02-varrun\") pod \"csi-node-driver-whxp8\" (UID: \"94f1513e-4d14-4aa4-9b49-2068e28e7d02\") " pod="calico-system/csi-node-driver-whxp8" May 14 00:44:20.576312 kubelet[1957]: I0514 00:44:20.576262 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/94f1513e-4d14-4aa4-9b49-2068e28e7d02-registration-dir\") pod \"csi-node-driver-whxp8\" (UID: \"94f1513e-4d14-4aa4-9b49-2068e28e7d02\") " pod="calico-system/csi-node-driver-whxp8" May 14 00:44:20.576312 kubelet[1957]: I0514 00:44:20.576284 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kwdz5\" (UniqueName: \"kubernetes.io/projected/94f1513e-4d14-4aa4-9b49-2068e28e7d02-kube-api-access-kwdz5\") pod \"csi-node-driver-whxp8\" (UID: \"94f1513e-4d14-4aa4-9b49-2068e28e7d02\") " pod="calico-system/csi-node-driver-whxp8" May 14 00:44:20.576397 kubelet[1957]: I0514 00:44:20.576324 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/94f1513e-4d14-4aa4-9b49-2068e28e7d02-socket-dir\") pod \"csi-node-driver-whxp8\" (UID: \"94f1513e-4d14-4aa4-9b49-2068e28e7d02\") " pod="calico-system/csi-node-driver-whxp8" May 14 00:44:20.579851 kubelet[1957]: E0514 00:44:20.579804 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.579851 kubelet[1957]: W0514 00:44:20.579824 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.579851 kubelet[1957]: E0514 00:44:20.579920 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.585457 kubelet[1957]: E0514 00:44:20.585430 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.585457 kubelet[1957]: W0514 00:44:20.585447 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.585601 kubelet[1957]: E0514 00:44:20.585467 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.590578 kubelet[1957]: E0514 00:44:20.590544 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.590687 kubelet[1957]: W0514 00:44:20.590672 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.590776 kubelet[1957]: E0514 00:44:20.590764 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.593405 kubelet[1957]: E0514 00:44:20.593389 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.593405 kubelet[1957]: W0514 00:44:20.593403 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.593523 kubelet[1957]: E0514 00:44:20.593424 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.611622 kubelet[1957]: E0514 00:44:20.611586 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:20.612239 env[1221]: time="2025-05-14T00:44:20.612188831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7df99dcfd-t2jl2,Uid:88b0b276-fa4e-40fb-a9db-b2b51e703af8,Namespace:calico-system,Attempt:0,}" May 14 00:44:20.630526 env[1221]: time="2025-05-14T00:44:20.630444880Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:20.630526 env[1221]: time="2025-05-14T00:44:20.630485650Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:20.630526 env[1221]: time="2025-05-14T00:44:20.630500133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:20.630915 env[1221]: time="2025-05-14T00:44:20.630881107Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79afb21d39e9a59c2026eee3b314ff54e3dc0a018f11219b8d312ae9594f3b99 pid=2355 runtime=io.containerd.runc.v2 May 14 00:44:20.642955 systemd[1]: Started cri-containerd-79afb21d39e9a59c2026eee3b314ff54e3dc0a018f11219b8d312ae9594f3b99.scope. May 14 00:44:20.669886 kubelet[1957]: E0514 00:44:20.668840 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:20.670022 env[1221]: time="2025-05-14T00:44:20.669582503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hsf4b,Uid:e8a3e02d-8777-433a-8b93-39f4499c15d9,Namespace:calico-system,Attempt:0,}" May 14 00:44:20.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit: BPF prog-id=115 op=LOAD May 14 00:44:20.675000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739616662323164333965396135396332303236656565336233313466 May 14 00:44:20.675000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.675000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739616662323164333965396135396332303236656565336233313466 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit: BPF prog-id=116 op=LOAD May 14 00:44:20.676000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739616662323164333965396135396332303236656565336233313466 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit: BPF prog-id=117 op=LOAD May 14 00:44:20.676000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739616662323164333965396135396332303236656565336233313466 May 14 00:44:20.676000 audit: BPF prog-id=117 op=UNLOAD May 14 00:44:20.676000 audit: BPF prog-id=116 op=UNLOAD May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.676000 audit: BPF prog-id=118 op=LOAD May 14 00:44:20.676000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2355 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739616662323164333965396135396332303236656565336233313466 May 14 00:44:20.678831 kubelet[1957]: E0514 00:44:20.678811 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.678950 kubelet[1957]: W0514 00:44:20.678934 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.679015 kubelet[1957]: E0514 00:44:20.679002 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.679312 kubelet[1957]: E0514 00:44:20.679301 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.679398 kubelet[1957]: W0514 00:44:20.679385 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.679474 kubelet[1957]: E0514 00:44:20.679463 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.679698 kubelet[1957]: E0514 00:44:20.679679 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.679742 kubelet[1957]: W0514 00:44:20.679699 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.679742 kubelet[1957]: E0514 00:44:20.679727 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.679958 kubelet[1957]: E0514 00:44:20.679946 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.679958 kubelet[1957]: W0514 00:44:20.679958 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.680038 kubelet[1957]: E0514 00:44:20.679972 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.680149 kubelet[1957]: E0514 00:44:20.680139 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.680149 kubelet[1957]: W0514 00:44:20.680149 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.680209 kubelet[1957]: E0514 00:44:20.680160 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.680420 kubelet[1957]: E0514 00:44:20.680409 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.680420 kubelet[1957]: W0514 00:44:20.680420 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.680496 kubelet[1957]: E0514 00:44:20.680430 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.680633 kubelet[1957]: E0514 00:44:20.680620 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.680665 kubelet[1957]: W0514 00:44:20.680633 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.680665 kubelet[1957]: E0514 00:44:20.680643 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.680853 kubelet[1957]: E0514 00:44:20.680836 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.680912 kubelet[1957]: W0514 00:44:20.680856 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.680978 kubelet[1957]: E0514 00:44:20.680963 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.681060 kubelet[1957]: E0514 00:44:20.681042 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.681104 kubelet[1957]: W0514 00:44:20.681059 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.681133 kubelet[1957]: E0514 00:44:20.681102 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.681328 kubelet[1957]: E0514 00:44:20.681314 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.681380 kubelet[1957]: W0514 00:44:20.681328 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.681380 kubelet[1957]: E0514 00:44:20.681351 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.681558 kubelet[1957]: E0514 00:44:20.681546 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.681610 kubelet[1957]: W0514 00:44:20.681558 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.681610 kubelet[1957]: E0514 00:44:20.681574 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.681982 kubelet[1957]: E0514 00:44:20.681914 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.681982 kubelet[1957]: W0514 00:44:20.681929 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.681982 kubelet[1957]: E0514 00:44:20.681945 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.682599 kubelet[1957]: E0514 00:44:20.682575 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.682599 kubelet[1957]: W0514 00:44:20.682590 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.682720 kubelet[1957]: E0514 00:44:20.682701 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.682968 kubelet[1957]: E0514 00:44:20.682953 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.682968 kubelet[1957]: W0514 00:44:20.682966 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.683099 kubelet[1957]: E0514 00:44:20.683084 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.683167 kubelet[1957]: E0514 00:44:20.683129 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.683231 kubelet[1957]: W0514 00:44:20.683217 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.683375 kubelet[1957]: E0514 00:44:20.683361 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.683507 kubelet[1957]: E0514 00:44:20.683484 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.683603 kubelet[1957]: W0514 00:44:20.683582 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.683835 kubelet[1957]: E0514 00:44:20.683806 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.683967 kubelet[1957]: E0514 00:44:20.683956 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.684052 kubelet[1957]: W0514 00:44:20.684039 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.684124 kubelet[1957]: E0514 00:44:20.684113 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.684355 kubelet[1957]: E0514 00:44:20.684324 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.684445 kubelet[1957]: W0514 00:44:20.684431 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.684512 kubelet[1957]: E0514 00:44:20.684501 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.684931 kubelet[1957]: E0514 00:44:20.684916 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.685023 kubelet[1957]: W0514 00:44:20.685010 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.685096 kubelet[1957]: E0514 00:44:20.685080 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.685369 kubelet[1957]: E0514 00:44:20.685357 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.685464 kubelet[1957]: W0514 00:44:20.685451 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.685530 kubelet[1957]: E0514 00:44:20.685519 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.685809 kubelet[1957]: E0514 00:44:20.685797 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.685897 kubelet[1957]: W0514 00:44:20.685884 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.686040 kubelet[1957]: E0514 00:44:20.686027 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.686144 kubelet[1957]: E0514 00:44:20.686135 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.686215 kubelet[1957]: W0514 00:44:20.686203 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.686276 kubelet[1957]: E0514 00:44:20.686265 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.686517 kubelet[1957]: E0514 00:44:20.686505 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.686590 kubelet[1957]: W0514 00:44:20.686578 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.686659 kubelet[1957]: E0514 00:44:20.686647 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.689692 kubelet[1957]: E0514 00:44:20.689675 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.689827 kubelet[1957]: W0514 00:44:20.689813 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.689937 kubelet[1957]: E0514 00:44:20.689925 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.690508 kubelet[1957]: E0514 00:44:20.690494 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.690604 kubelet[1957]: W0514 00:44:20.690580 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.690679 kubelet[1957]: E0514 00:44:20.690666 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.691080 env[1221]: time="2025-05-14T00:44:20.690059698Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:20.691080 env[1221]: time="2025-05-14T00:44:20.690095867Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:20.691080 env[1221]: time="2025-05-14T00:44:20.690106070Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:20.691080 env[1221]: time="2025-05-14T00:44:20.690384058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545 pid=2408 runtime=io.containerd.runc.v2 May 14 00:44:20.700466 systemd[1]: Started cri-containerd-fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545.scope. May 14 00:44:20.700788 kubelet[1957]: E0514 00:44:20.700542 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:20.700788 kubelet[1957]: W0514 00:44:20.700559 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:20.700788 kubelet[1957]: E0514 00:44:20.700575 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:20.705428 env[1221]: time="2025-05-14T00:44:20.705385467Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7df99dcfd-t2jl2,Uid:88b0b276-fa4e-40fb-a9db-b2b51e703af8,Namespace:calico-system,Attempt:0,} returns sandbox id \"79afb21d39e9a59c2026eee3b314ff54e3dc0a018f11219b8d312ae9594f3b99\"" May 14 00:44:20.706162 kubelet[1957]: E0514 00:44:20.706142 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:20.707337 env[1221]: time="2025-05-14T00:44:20.707309900Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 14 00:44:20.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit: BPF prog-id=119 op=LOAD May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2408 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633139376331303334653666623735613064373763623763373839 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2408 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633139376331303334653666623735613064373763623763373839 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit: BPF prog-id=120 op=LOAD May 14 00:44:20.731000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2408 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633139376331303334653666623735613064373763623763373839 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit: BPF prog-id=121 op=LOAD May 14 00:44:20.731000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2408 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633139376331303334653666623735613064373763623763373839 May 14 00:44:20.731000 audit: BPF prog-id=121 op=UNLOAD May 14 00:44:20.731000 audit: BPF prog-id=120 op=UNLOAD May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { perfmon } for pid=2423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit[2423]: AVC avc: denied { bpf } for pid=2423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:20.731000 audit: BPF prog-id=122 op=LOAD May 14 00:44:20.731000 audit[2423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2408 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:20.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663633139376331303334653666623735613064373763623763373839 May 14 00:44:20.744203 env[1221]: time="2025-05-14T00:44:20.744057335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hsf4b,Uid:e8a3e02d-8777-433a-8b93-39f4499c15d9,Namespace:calico-system,Attempt:0,} returns sandbox id \"fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545\"" May 14 00:44:20.745229 kubelet[1957]: E0514 00:44:20.744797 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:21.025096 update_engine[1212]: I0514 00:44:21.024967 1212 update_attempter.cc:509] Updating boot flags... May 14 00:44:21.185000 audit[2471]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:21.185000 audit[2471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffee94f750 a2=0 a3=1 items=0 ppid=2106 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:21.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:21.193000 audit[2471]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:21.193000 audit[2471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffee94f750 a2=0 a3=1 items=0 ppid=2106 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:21.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:22.373718 env[1221]: time="2025-05-14T00:44:22.373673055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:22.375234 env[1221]: time="2025-05-14T00:44:22.375200875Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:22.376986 env[1221]: time="2025-05-14T00:44:22.376954625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:22.378423 env[1221]: time="2025-05-14T00:44:22.378393785Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:22.378814 env[1221]: time="2025-05-14T00:44:22.378773710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 14 00:44:22.381277 env[1221]: time="2025-05-14T00:44:22.379778253Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 14 00:44:22.388882 env[1221]: time="2025-05-14T00:44:22.387764390Z" level=info msg="CreateContainer within sandbox \"79afb21d39e9a59c2026eee3b314ff54e3dc0a018f11219b8d312ae9594f3b99\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 14 00:44:22.399158 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3083501648.mount: Deactivated successfully. May 14 00:44:22.466113 env[1221]: time="2025-05-14T00:44:22.466061969Z" level=info msg="CreateContainer within sandbox \"79afb21d39e9a59c2026eee3b314ff54e3dc0a018f11219b8d312ae9594f3b99\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"dbc7cfde0ad7dd619792673edf018e87243d6bc1e9bfb1f50965eb162a1fb326\"" May 14 00:44:22.466817 env[1221]: time="2025-05-14T00:44:22.466785810Z" level=info msg="StartContainer for \"dbc7cfde0ad7dd619792673edf018e87243d6bc1e9bfb1f50965eb162a1fb326\"" May 14 00:44:22.486050 systemd[1]: Started cri-containerd-dbc7cfde0ad7dd619792673edf018e87243d6bc1e9bfb1f50965eb162a1fb326.scope. May 14 00:44:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533083 kernel: kauditd_printk_skb: 179 callbacks suppressed May 14 00:44:22.533166 kernel: audit: type=1400 audit(1747183462.530:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.536554 kernel: audit: type=1400 audit(1747183462.530:950): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.536619 kernel: audit: type=1400 audit(1747183462.530:951): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.540138 kernel: audit: type=1400 audit(1747183462.530:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.540195 kernel: audit: type=1400 audit(1747183462.530:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.543979 kernel: audit: type=1400 audit(1747183462.530:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.544048 kernel: audit: type=1400 audit(1747183462.530:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.545690 kernel: audit: type=1400 audit(1747183462.530:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.547462 kernel: audit: type=1400 audit(1747183462.530:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.549187 kernel: audit: type=1400 audit(1747183462.530:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.530000 audit: BPF prog-id=123 op=LOAD May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2355 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:22.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462633763666465306164376464363139373932363733656466303138 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2355 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:22.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462633763666465306164376464363139373932363733656466303138 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit: BPF prog-id=124 op=LOAD May 14 00:44:22.531000 audit[2482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2355 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:22.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462633763666465306164376464363139373932363733656466303138 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.531000 audit: BPF prog-id=125 op=LOAD May 14 00:44:22.531000 audit[2482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2355 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:22.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462633763666465306164376464363139373932363733656466303138 May 14 00:44:22.533000 audit: BPF prog-id=125 op=UNLOAD May 14 00:44:22.533000 audit: BPF prog-id=124 op=UNLOAD May 14 00:44:22.533000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:22.533000 audit: BPF prog-id=126 op=LOAD May 14 00:44:22.533000 audit[2482]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2355 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:22.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462633763666465306164376464363139373932363733656466303138 May 14 00:44:22.614198 kubelet[1957]: E0514 00:44:22.614130 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-whxp8" podUID="94f1513e-4d14-4aa4-9b49-2068e28e7d02" May 14 00:44:22.616038 env[1221]: time="2025-05-14T00:44:22.615838529Z" level=info msg="StartContainer for \"dbc7cfde0ad7dd619792673edf018e87243d6bc1e9bfb1f50965eb162a1fb326\" returns successfully" May 14 00:44:22.661787 kubelet[1957]: E0514 00:44:22.661699 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:22.691011 kubelet[1957]: E0514 00:44:22.690971 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.691011 kubelet[1957]: W0514 00:44:22.690996 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.691011 kubelet[1957]: E0514 00:44:22.691016 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.691343 kubelet[1957]: E0514 00:44:22.691324 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.691343 kubelet[1957]: W0514 00:44:22.691340 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.691425 kubelet[1957]: E0514 00:44:22.691352 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.693055 kubelet[1957]: E0514 00:44:22.693031 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.693055 kubelet[1957]: W0514 00:44:22.693049 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.693183 kubelet[1957]: E0514 00:44:22.693062 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.696954 kubelet[1957]: E0514 00:44:22.696919 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.696954 kubelet[1957]: W0514 00:44:22.696947 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.697073 kubelet[1957]: E0514 00:44:22.696962 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.697257 kubelet[1957]: E0514 00:44:22.697237 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.697257 kubelet[1957]: W0514 00:44:22.697252 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.697333 kubelet[1957]: E0514 00:44:22.697263 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.698238 kubelet[1957]: E0514 00:44:22.698216 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.698238 kubelet[1957]: W0514 00:44:22.698239 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.698341 kubelet[1957]: E0514 00:44:22.698253 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.698446 kubelet[1957]: E0514 00:44:22.698432 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.698446 kubelet[1957]: W0514 00:44:22.698443 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.698506 kubelet[1957]: E0514 00:44:22.698457 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.698594 kubelet[1957]: E0514 00:44:22.698581 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.698629 kubelet[1957]: W0514 00:44:22.698592 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.698629 kubelet[1957]: E0514 00:44:22.698606 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.698757 kubelet[1957]: E0514 00:44:22.698741 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.698757 kubelet[1957]: W0514 00:44:22.698753 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.698816 kubelet[1957]: E0514 00:44:22.698767 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.698917 kubelet[1957]: E0514 00:44:22.698905 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.698954 kubelet[1957]: W0514 00:44:22.698916 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.698954 kubelet[1957]: E0514 00:44:22.698926 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.699286 kubelet[1957]: E0514 00:44:22.699271 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.699286 kubelet[1957]: W0514 00:44:22.699285 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.699349 kubelet[1957]: E0514 00:44:22.699296 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.699493 kubelet[1957]: E0514 00:44:22.699480 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.699493 kubelet[1957]: W0514 00:44:22.699491 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.699560 kubelet[1957]: E0514 00:44:22.699499 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.700243 kubelet[1957]: E0514 00:44:22.700226 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.700243 kubelet[1957]: W0514 00:44:22.700243 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.700339 kubelet[1957]: E0514 00:44:22.700255 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.700498 kubelet[1957]: E0514 00:44:22.700483 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.700498 kubelet[1957]: W0514 00:44:22.700495 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.700579 kubelet[1957]: E0514 00:44:22.700512 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.700778 kubelet[1957]: E0514 00:44:22.700765 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.700810 kubelet[1957]: W0514 00:44:22.700778 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.700810 kubelet[1957]: E0514 00:44:22.700791 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.701085 kubelet[1957]: E0514 00:44:22.701066 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.701146 kubelet[1957]: W0514 00:44:22.701087 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.701146 kubelet[1957]: E0514 00:44:22.701110 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.701371 kubelet[1957]: E0514 00:44:22.701354 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.701371 kubelet[1957]: W0514 00:44:22.701370 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.701446 kubelet[1957]: E0514 00:44:22.701382 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.703184 kubelet[1957]: E0514 00:44:22.703160 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.703184 kubelet[1957]: W0514 00:44:22.703178 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.703284 kubelet[1957]: E0514 00:44:22.703196 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.703445 kubelet[1957]: E0514 00:44:22.703433 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.703494 kubelet[1957]: W0514 00:44:22.703446 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.703665 kubelet[1957]: E0514 00:44:22.703546 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.703728 kubelet[1957]: E0514 00:44:22.703682 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.703728 kubelet[1957]: W0514 00:44:22.703690 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.703924 kubelet[1957]: E0514 00:44:22.703796 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.703986 kubelet[1957]: E0514 00:44:22.703949 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.703986 kubelet[1957]: W0514 00:44:22.703957 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.704157 kubelet[1957]: E0514 00:44:22.704048 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.704213 kubelet[1957]: E0514 00:44:22.704172 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.704213 kubelet[1957]: W0514 00:44:22.704180 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.704213 kubelet[1957]: E0514 00:44:22.704191 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.704407 kubelet[1957]: E0514 00:44:22.704397 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.704407 kubelet[1957]: W0514 00:44:22.704406 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.704465 kubelet[1957]: E0514 00:44:22.704417 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.704601 kubelet[1957]: E0514 00:44:22.704591 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.704601 kubelet[1957]: W0514 00:44:22.704601 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.704662 kubelet[1957]: E0514 00:44:22.704611 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.705411 kubelet[1957]: E0514 00:44:22.705127 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.705411 kubelet[1957]: W0514 00:44:22.705142 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.705411 kubelet[1957]: E0514 00:44:22.705223 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.705930 kubelet[1957]: E0514 00:44:22.705910 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.705930 kubelet[1957]: W0514 00:44:22.705925 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.706172 kubelet[1957]: E0514 00:44:22.706046 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.706234 kubelet[1957]: E0514 00:44:22.706182 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.706234 kubelet[1957]: W0514 00:44:22.706190 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.706234 kubelet[1957]: E0514 00:44:22.706206 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.706936 kubelet[1957]: E0514 00:44:22.706920 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.706936 kubelet[1957]: W0514 00:44:22.706936 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.707023 kubelet[1957]: E0514 00:44:22.706954 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.707536 kubelet[1957]: E0514 00:44:22.707519 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.707536 kubelet[1957]: W0514 00:44:22.707534 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.707608 kubelet[1957]: E0514 00:44:22.707558 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.707783 kubelet[1957]: E0514 00:44:22.707772 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.707820 kubelet[1957]: W0514 00:44:22.707783 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.707884 kubelet[1957]: E0514 00:44:22.707875 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.708084 kubelet[1957]: E0514 00:44:22.708071 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.708084 kubelet[1957]: W0514 00:44:22.708084 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.708173 kubelet[1957]: E0514 00:44:22.708102 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.708980 kubelet[1957]: E0514 00:44:22.708962 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.708980 kubelet[1957]: W0514 00:44:22.708977 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.709142 kubelet[1957]: E0514 00:44:22.708994 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:22.709345 kubelet[1957]: E0514 00:44:22.709331 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 14 00:44:22.709382 kubelet[1957]: W0514 00:44:22.709345 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 14 00:44:22.709382 kubelet[1957]: E0514 00:44:22.709357 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 14 00:44:23.476862 env[1221]: time="2025-05-14T00:44:23.476809780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:23.480054 env[1221]: time="2025-05-14T00:44:23.478018957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:23.480054 env[1221]: time="2025-05-14T00:44:23.479520555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:23.481339 env[1221]: time="2025-05-14T00:44:23.481302652Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:23.481743 env[1221]: time="2025-05-14T00:44:23.481711459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 14 00:44:23.484612 env[1221]: time="2025-05-14T00:44:23.484571105Z" level=info msg="CreateContainer within sandbox \"fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 14 00:44:23.498752 env[1221]: time="2025-05-14T00:44:23.498714661Z" level=info msg="CreateContainer within sandbox \"fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"86e044f979313ac6a9f01e148d934921512ab86dfbe102f1b2ff12a932c57840\"" May 14 00:44:23.499362 env[1221]: time="2025-05-14T00:44:23.499305306Z" level=info msg="StartContainer for \"86e044f979313ac6a9f01e148d934921512ab86dfbe102f1b2ff12a932c57840\"" May 14 00:44:23.520614 systemd[1]: Started cri-containerd-86e044f979313ac6a9f01e148d934921512ab86dfbe102f1b2ff12a932c57840.scope. May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2408 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:23.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653034346639373933313361633661396630316531343864393334 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit: BPF prog-id=127 op=LOAD May 14 00:44:23.547000 audit[2553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2408 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:23.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653034346639373933313361633661396630316531343864393334 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit: BPF prog-id=128 op=LOAD May 14 00:44:23.547000 audit[2553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2408 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:23.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653034346639373933313361633661396630316531343864393334 May 14 00:44:23.547000 audit: BPF prog-id=128 op=UNLOAD May 14 00:44:23.547000 audit: BPF prog-id=127 op=UNLOAD May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:23.547000 audit: BPF prog-id=129 op=LOAD May 14 00:44:23.547000 audit[2553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2408 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:23.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836653034346639373933313361633661396630316531343864393334 May 14 00:44:23.577864 env[1221]: time="2025-05-14T00:44:23.577805736Z" level=info msg="StartContainer for \"86e044f979313ac6a9f01e148d934921512ab86dfbe102f1b2ff12a932c57840\" returns successfully" May 14 00:44:23.584877 systemd[1]: cri-containerd-86e044f979313ac6a9f01e148d934921512ab86dfbe102f1b2ff12a932c57840.scope: Deactivated successfully. May 14 00:44:23.590000 audit: BPF prog-id=129 op=UNLOAD May 14 00:44:23.601160 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-86e044f979313ac6a9f01e148d934921512ab86dfbe102f1b2ff12a932c57840-rootfs.mount: Deactivated successfully. May 14 00:44:23.646120 env[1221]: time="2025-05-14T00:44:23.646072998Z" level=info msg="shim disconnected" id=86e044f979313ac6a9f01e148d934921512ab86dfbe102f1b2ff12a932c57840 May 14 00:44:23.646120 env[1221]: time="2025-05-14T00:44:23.646120088Z" level=warning msg="cleaning up after shim disconnected" id=86e044f979313ac6a9f01e148d934921512ab86dfbe102f1b2ff12a932c57840 namespace=k8s.io May 14 00:44:23.646348 env[1221]: time="2025-05-14T00:44:23.646129650Z" level=info msg="cleaning up dead shim" May 14 00:44:23.653293 env[1221]: time="2025-05-14T00:44:23.653206029Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:44:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2591 runtime=io.containerd.runc.v2\n" May 14 00:44:23.664435 kubelet[1957]: I0514 00:44:23.664392 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:44:23.664721 kubelet[1957]: E0514 00:44:23.664670 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:23.664856 kubelet[1957]: E0514 00:44:23.664818 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:23.666583 env[1221]: time="2025-05-14T00:44:23.666550856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 14 00:44:23.678734 kubelet[1957]: I0514 00:44:23.678660 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7df99dcfd-t2jl2" podStartSLOduration=2.006081797 podStartE2EDuration="3.678645538s" podCreationTimestamp="2025-05-14 00:44:20 +0000 UTC" firstStartedPulling="2025-05-14 00:44:20.707036633 +0000 UTC m=+14.183835753" lastFinishedPulling="2025-05-14 00:44:22.379600374 +0000 UTC m=+15.856399494" observedRunningTime="2025-05-14 00:44:22.677358615 +0000 UTC m=+16.154157735" watchObservedRunningTime="2025-05-14 00:44:23.678645538 +0000 UTC m=+17.155444658" May 14 00:44:24.614065 kubelet[1957]: E0514 00:44:24.614004 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-whxp8" podUID="94f1513e-4d14-4aa4-9b49-2068e28e7d02" May 14 00:44:26.622046 kubelet[1957]: E0514 00:44:26.621968 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-whxp8" podUID="94f1513e-4d14-4aa4-9b49-2068e28e7d02" May 14 00:44:27.033119 env[1221]: time="2025-05-14T00:44:27.032987419Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:27.034477 env[1221]: time="2025-05-14T00:44:27.034452796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:27.035744 env[1221]: time="2025-05-14T00:44:27.035711017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:27.037113 env[1221]: time="2025-05-14T00:44:27.037081257Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:27.037526 env[1221]: time="2025-05-14T00:44:27.037499731Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 14 00:44:27.043314 env[1221]: time="2025-05-14T00:44:27.043279626Z" level=info msg="CreateContainer within sandbox \"fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 14 00:44:27.053724 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2482289511.mount: Deactivated successfully. May 14 00:44:27.058011 env[1221]: time="2025-05-14T00:44:27.057963084Z" level=info msg="CreateContainer within sandbox \"fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"09c9cf82ad861a5c8d066a497be858443ae9aec85b90bf70999ce86caf18b53b\"" May 14 00:44:27.059645 env[1221]: time="2025-05-14T00:44:27.059611173Z" level=info msg="StartContainer for \"09c9cf82ad861a5c8d066a497be858443ae9aec85b90bf70999ce86caf18b53b\"" May 14 00:44:27.076546 systemd[1]: Started cri-containerd-09c9cf82ad861a5c8d066a497be858443ae9aec85b90bf70999ce86caf18b53b.scope. May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2408 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:27.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633963663832616438363161356338643036366134393762653835 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit: BPF prog-id=130 op=LOAD May 14 00:44:27.114000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2408 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:27.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633963663832616438363161356338643036366134393762653835 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit: BPF prog-id=131 op=LOAD May 14 00:44:27.114000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2408 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:27.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633963663832616438363161356338643036366134393762653835 May 14 00:44:27.114000 audit: BPF prog-id=131 op=UNLOAD May 14 00:44:27.114000 audit: BPF prog-id=130 op=UNLOAD May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:27.114000 audit: BPF prog-id=132 op=LOAD May 14 00:44:27.114000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2408 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:27.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633963663832616438363161356338643036366134393762653835 May 14 00:44:27.228888 env[1221]: time="2025-05-14T00:44:27.228817163Z" level=info msg="StartContainer for \"09c9cf82ad861a5c8d066a497be858443ae9aec85b90bf70999ce86caf18b53b\" returns successfully" May 14 00:44:27.679974 kubelet[1957]: E0514 00:44:27.679930 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:27.702511 env[1221]: time="2025-05-14T00:44:27.702446405Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 14 00:44:27.704371 systemd[1]: cri-containerd-09c9cf82ad861a5c8d066a497be858443ae9aec85b90bf70999ce86caf18b53b.scope: Deactivated successfully. May 14 00:44:27.708000 audit: BPF prog-id=132 op=UNLOAD May 14 00:44:27.711212 kernel: kauditd_printk_skb: 134 callbacks suppressed May 14 00:44:27.711275 kernel: audit: type=1334 audit(1747183467.708:980): prog-id=132 op=UNLOAD May 14 00:44:27.721017 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-09c9cf82ad861a5c8d066a497be858443ae9aec85b90bf70999ce86caf18b53b-rootfs.mount: Deactivated successfully. May 14 00:44:27.746610 env[1221]: time="2025-05-14T00:44:27.746564272Z" level=info msg="shim disconnected" id=09c9cf82ad861a5c8d066a497be858443ae9aec85b90bf70999ce86caf18b53b May 14 00:44:27.746838 env[1221]: time="2025-05-14T00:44:27.746818677Z" level=warning msg="cleaning up after shim disconnected" id=09c9cf82ad861a5c8d066a497be858443ae9aec85b90bf70999ce86caf18b53b namespace=k8s.io May 14 00:44:27.746936 env[1221]: time="2025-05-14T00:44:27.746921055Z" level=info msg="cleaning up dead shim" May 14 00:44:27.753575 env[1221]: time="2025-05-14T00:44:27.753534416Z" level=warning msg="cleanup warnings time=\"2025-05-14T00:44:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2659 runtime=io.containerd.runc.v2\n" May 14 00:44:27.760972 kubelet[1957]: I0514 00:44:27.760923 1957 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 14 00:44:27.793495 kubelet[1957]: W0514 00:44:27.793149 1957 reflector.go:561] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 14 00:44:27.793495 kubelet[1957]: E0514 00:44:27.793202 1957 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:localhost\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 14 00:44:27.798563 systemd[1]: Created slice kubepods-burstable-podfdcb9a54_9cbc_4a77_a30d_0868729ac8ed.slice. May 14 00:44:27.810329 systemd[1]: Created slice kubepods-besteffort-pod4b452a49_73dd_4786_b4d1_3d70d68f9bf5.slice. May 14 00:44:27.814651 systemd[1]: Created slice kubepods-besteffort-pod40e9ab38_4275_4c7c_af02_c469c09d267b.slice. May 14 00:44:27.821840 systemd[1]: Created slice kubepods-besteffort-pod76d26012_d4dd_4f9e_8998_4a7a2c75c980.slice. May 14 00:44:27.825629 systemd[1]: Created slice kubepods-burstable-podf3b7d914_57dd_4086_aa7d_60f72ce2c022.slice. May 14 00:44:27.952497 kubelet[1957]: I0514 00:44:27.952382 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4b452a49-73dd-4786-b4d1-3d70d68f9bf5-calico-apiserver-certs\") pod \"calico-apiserver-7fd6c7cdf6-22ps2\" (UID: \"4b452a49-73dd-4786-b4d1-3d70d68f9bf5\") " pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-22ps2" May 14 00:44:27.952694 kubelet[1957]: I0514 00:44:27.952677 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9cxh\" (UniqueName: \"kubernetes.io/projected/76d26012-d4dd-4f9e-8998-4a7a2c75c980-kube-api-access-v9cxh\") pod \"calico-apiserver-7fd6c7cdf6-pnvfg\" (UID: \"76d26012-d4dd-4f9e-8998-4a7a2c75c980\") " pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-pnvfg" May 14 00:44:27.952902 kubelet[1957]: I0514 00:44:27.952807 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5dd5m\" (UniqueName: \"kubernetes.io/projected/fdcb9a54-9cbc-4a77-a30d-0868729ac8ed-kube-api-access-5dd5m\") pod \"coredns-6f6b679f8f-q7gw2\" (UID: \"fdcb9a54-9cbc-4a77-a30d-0868729ac8ed\") " pod="kube-system/coredns-6f6b679f8f-q7gw2" May 14 00:44:27.953037 kubelet[1957]: I0514 00:44:27.953021 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/40e9ab38-4275-4c7c-af02-c469c09d267b-tigera-ca-bundle\") pod \"calico-kube-controllers-78778d7d95-szsq8\" (UID: \"40e9ab38-4275-4c7c-af02-c469c09d267b\") " pod="calico-system/calico-kube-controllers-78778d7d95-szsq8" May 14 00:44:27.953167 kubelet[1957]: I0514 00:44:27.953151 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p45d2\" (UniqueName: \"kubernetes.io/projected/40e9ab38-4275-4c7c-af02-c469c09d267b-kube-api-access-p45d2\") pod \"calico-kube-controllers-78778d7d95-szsq8\" (UID: \"40e9ab38-4275-4c7c-af02-c469c09d267b\") " pod="calico-system/calico-kube-controllers-78778d7d95-szsq8" May 14 00:44:27.953313 kubelet[1957]: I0514 00:44:27.953298 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/fdcb9a54-9cbc-4a77-a30d-0868729ac8ed-config-volume\") pod \"coredns-6f6b679f8f-q7gw2\" (UID: \"fdcb9a54-9cbc-4a77-a30d-0868729ac8ed\") " pod="kube-system/coredns-6f6b679f8f-q7gw2" May 14 00:44:27.953429 kubelet[1957]: I0514 00:44:27.953416 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f3b7d914-57dd-4086-aa7d-60f72ce2c022-config-volume\") pod \"coredns-6f6b679f8f-kv768\" (UID: \"f3b7d914-57dd-4086-aa7d-60f72ce2c022\") " pod="kube-system/coredns-6f6b679f8f-kv768" May 14 00:44:27.953768 kubelet[1957]: I0514 00:44:27.953742 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-24wrf\" (UniqueName: \"kubernetes.io/projected/4b452a49-73dd-4786-b4d1-3d70d68f9bf5-kube-api-access-24wrf\") pod \"calico-apiserver-7fd6c7cdf6-22ps2\" (UID: \"4b452a49-73dd-4786-b4d1-3d70d68f9bf5\") " pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-22ps2" May 14 00:44:27.953917 kubelet[1957]: I0514 00:44:27.953897 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wh4wx\" (UniqueName: \"kubernetes.io/projected/f3b7d914-57dd-4086-aa7d-60f72ce2c022-kube-api-access-wh4wx\") pod \"coredns-6f6b679f8f-kv768\" (UID: \"f3b7d914-57dd-4086-aa7d-60f72ce2c022\") " pod="kube-system/coredns-6f6b679f8f-kv768" May 14 00:44:27.954035 kubelet[1957]: I0514 00:44:27.954020 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/76d26012-d4dd-4f9e-8998-4a7a2c75c980-calico-apiserver-certs\") pod \"calico-apiserver-7fd6c7cdf6-pnvfg\" (UID: \"76d26012-d4dd-4f9e-8998-4a7a2c75c980\") " pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-pnvfg" May 14 00:44:28.113558 env[1221]: time="2025-05-14T00:44:28.113509536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fd6c7cdf6-22ps2,Uid:4b452a49-73dd-4786-b4d1-3d70d68f9bf5,Namespace:calico-apiserver,Attempt:0,}" May 14 00:44:28.119380 env[1221]: time="2025-05-14T00:44:28.119322431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78778d7d95-szsq8,Uid:40e9ab38-4275-4c7c-af02-c469c09d267b,Namespace:calico-system,Attempt:0,}" May 14 00:44:28.127535 env[1221]: time="2025-05-14T00:44:28.124231856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fd6c7cdf6-pnvfg,Uid:76d26012-d4dd-4f9e-8998-4a7a2c75c980,Namespace:calico-apiserver,Attempt:0,}" May 14 00:44:28.393816 env[1221]: time="2025-05-14T00:44:28.393744184Z" level=error msg="Failed to destroy network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.394345 env[1221]: time="2025-05-14T00:44:28.394308839Z" level=error msg="encountered an error cleaning up failed sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.394409 env[1221]: time="2025-05-14T00:44:28.394364729Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fd6c7cdf6-pnvfg,Uid:76d26012-d4dd-4f9e-8998-4a7a2c75c980,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.394614 kubelet[1957]: E0514 00:44:28.394574 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.394704 kubelet[1957]: E0514 00:44:28.394653 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-pnvfg" May 14 00:44:28.395396 env[1221]: time="2025-05-14T00:44:28.395355415Z" level=error msg="Failed to destroy network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.395462 kubelet[1957]: E0514 00:44:28.395386 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-pnvfg" May 14 00:44:28.395508 kubelet[1957]: E0514 00:44:28.395455 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7fd6c7cdf6-pnvfg_calico-apiserver(76d26012-d4dd-4f9e-8998-4a7a2c75c980)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7fd6c7cdf6-pnvfg_calico-apiserver(76d26012-d4dd-4f9e-8998-4a7a2c75c980)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-pnvfg" podUID="76d26012-d4dd-4f9e-8998-4a7a2c75c980" May 14 00:44:28.395936 env[1221]: time="2025-05-14T00:44:28.395900786Z" level=error msg="encountered an error cleaning up failed sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.396062 env[1221]: time="2025-05-14T00:44:28.396033809Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78778d7d95-szsq8,Uid:40e9ab38-4275-4c7c-af02-c469c09d267b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.396308 kubelet[1957]: E0514 00:44:28.396259 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.396373 kubelet[1957]: E0514 00:44:28.396327 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78778d7d95-szsq8" May 14 00:44:28.396373 kubelet[1957]: E0514 00:44:28.396345 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78778d7d95-szsq8" May 14 00:44:28.396431 kubelet[1957]: E0514 00:44:28.396378 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-78778d7d95-szsq8_calico-system(40e9ab38-4275-4c7c-af02-c469c09d267b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-78778d7d95-szsq8_calico-system(40e9ab38-4275-4c7c-af02-c469c09d267b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78778d7d95-szsq8" podUID="40e9ab38-4275-4c7c-af02-c469c09d267b" May 14 00:44:28.400265 env[1221]: time="2025-05-14T00:44:28.400205349Z" level=error msg="Failed to destroy network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.400594 env[1221]: time="2025-05-14T00:44:28.400559369Z" level=error msg="encountered an error cleaning up failed sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.400681 env[1221]: time="2025-05-14T00:44:28.400608977Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fd6c7cdf6-22ps2,Uid:4b452a49-73dd-4786-b4d1-3d70d68f9bf5,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.400816 kubelet[1957]: E0514 00:44:28.400788 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.400878 kubelet[1957]: E0514 00:44:28.400833 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-22ps2" May 14 00:44:28.400913 kubelet[1957]: E0514 00:44:28.400880 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-22ps2" May 14 00:44:28.400949 kubelet[1957]: E0514 00:44:28.400918 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7fd6c7cdf6-22ps2_calico-apiserver(4b452a49-73dd-4786-b4d1-3d70d68f9bf5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7fd6c7cdf6-22ps2_calico-apiserver(4b452a49-73dd-4786-b4d1-3d70d68f9bf5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-22ps2" podUID="4b452a49-73dd-4786-b4d1-3d70d68f9bf5" May 14 00:44:28.618751 systemd[1]: Created slice kubepods-besteffort-pod94f1513e_4d14_4aa4_9b49_2068e28e7d02.slice. May 14 00:44:28.620688 env[1221]: time="2025-05-14T00:44:28.620648680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-whxp8,Uid:94f1513e-4d14-4aa4-9b49-2068e28e7d02,Namespace:calico-system,Attempt:0,}" May 14 00:44:28.672652 env[1221]: time="2025-05-14T00:44:28.672536151Z" level=error msg="Failed to destroy network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.673484 env[1221]: time="2025-05-14T00:44:28.673442703Z" level=error msg="encountered an error cleaning up failed sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.673621 env[1221]: time="2025-05-14T00:44:28.673590368Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-whxp8,Uid:94f1513e-4d14-4aa4-9b49-2068e28e7d02,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.674039 kubelet[1957]: E0514 00:44:28.673884 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.674039 kubelet[1957]: E0514 00:44:28.673935 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-whxp8" May 14 00:44:28.674039 kubelet[1957]: E0514 00:44:28.673958 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-whxp8" May 14 00:44:28.674174 kubelet[1957]: E0514 00:44:28.673998 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-whxp8_calico-system(94f1513e-4d14-4aa4-9b49-2068e28e7d02)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-whxp8_calico-system(94f1513e-4d14-4aa4-9b49-2068e28e7d02)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-whxp8" podUID="94f1513e-4d14-4aa4-9b49-2068e28e7d02" May 14 00:44:28.680100 kubelet[1957]: I0514 00:44:28.680072 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:44:28.682061 env[1221]: time="2025-05-14T00:44:28.682031625Z" level=info msg="StopPodSandbox for \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\"" May 14 00:44:28.682497 kubelet[1957]: I0514 00:44:28.682469 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:44:28.682890 env[1221]: time="2025-05-14T00:44:28.682840881Z" level=info msg="StopPodSandbox for \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\"" May 14 00:44:28.687952 kubelet[1957]: E0514 00:44:28.687927 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:28.688519 kubelet[1957]: I0514 00:44:28.688457 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:44:28.689161 env[1221]: time="2025-05-14T00:44:28.688945746Z" level=info msg="StopPodSandbox for \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\"" May 14 00:44:28.689431 env[1221]: time="2025-05-14T00:44:28.689411424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 14 00:44:28.693098 kubelet[1957]: I0514 00:44:28.692586 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:44:28.694803 env[1221]: time="2025-05-14T00:44:28.694770884Z" level=info msg="StopPodSandbox for \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\"" May 14 00:44:28.729062 env[1221]: time="2025-05-14T00:44:28.728959784Z" level=error msg="StopPodSandbox for \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\" failed" error="failed to destroy network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.729504 kubelet[1957]: E0514 00:44:28.729469 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:44:28.729604 kubelet[1957]: E0514 00:44:28.729528 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610"} May 14 00:44:28.729604 kubelet[1957]: E0514 00:44:28.729585 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4b452a49-73dd-4786-b4d1-3d70d68f9bf5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:44:28.729719 kubelet[1957]: E0514 00:44:28.729610 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4b452a49-73dd-4786-b4d1-3d70d68f9bf5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-22ps2" podUID="4b452a49-73dd-4786-b4d1-3d70d68f9bf5" May 14 00:44:28.737047 env[1221]: time="2025-05-14T00:44:28.736997814Z" level=error msg="StopPodSandbox for \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\" failed" error="failed to destroy network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.737234 kubelet[1957]: E0514 00:44:28.737199 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:44:28.737306 kubelet[1957]: E0514 00:44:28.737243 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795"} May 14 00:44:28.737306 kubelet[1957]: E0514 00:44:28.737272 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"94f1513e-4d14-4aa4-9b49-2068e28e7d02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:44:28.737306 kubelet[1957]: E0514 00:44:28.737290 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"94f1513e-4d14-4aa4-9b49-2068e28e7d02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-whxp8" podUID="94f1513e-4d14-4aa4-9b49-2068e28e7d02" May 14 00:44:28.737907 env[1221]: time="2025-05-14T00:44:28.737824712Z" level=error msg="StopPodSandbox for \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\" failed" error="failed to destroy network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.738055 kubelet[1957]: E0514 00:44:28.738024 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:44:28.738098 kubelet[1957]: E0514 00:44:28.738059 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260"} May 14 00:44:28.738098 kubelet[1957]: E0514 00:44:28.738080 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"76d26012-d4dd-4f9e-8998-4a7a2c75c980\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:44:28.738169 kubelet[1957]: E0514 00:44:28.738096 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"76d26012-d4dd-4f9e-8998-4a7a2c75c980\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-pnvfg" podUID="76d26012-d4dd-4f9e-8998-4a7a2c75c980" May 14 00:44:28.744592 env[1221]: time="2025-05-14T00:44:28.744556203Z" level=error msg="StopPodSandbox for \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\" failed" error="failed to destroy network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:28.744863 kubelet[1957]: E0514 00:44:28.744820 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:44:28.744934 kubelet[1957]: E0514 00:44:28.744864 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6"} May 14 00:44:28.744934 kubelet[1957]: E0514 00:44:28.744911 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"40e9ab38-4275-4c7c-af02-c469c09d267b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:44:28.744934 kubelet[1957]: E0514 00:44:28.744929 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"40e9ab38-4275-4c7c-af02-c469c09d267b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78778d7d95-szsq8" podUID="40e9ab38-4275-4c7c-af02-c469c09d267b" May 14 00:44:29.007057 kubelet[1957]: E0514 00:44:29.006942 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:29.007692 env[1221]: time="2025-05-14T00:44:29.007650165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-q7gw2,Uid:fdcb9a54-9cbc-4a77-a30d-0868729ac8ed,Namespace:kube-system,Attempt:0,}" May 14 00:44:29.027478 kubelet[1957]: E0514 00:44:29.027444 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:29.027954 env[1221]: time="2025-05-14T00:44:29.027910020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-kv768,Uid:f3b7d914-57dd-4086-aa7d-60f72ce2c022,Namespace:kube-system,Attempt:0,}" May 14 00:44:29.075911 env[1221]: time="2025-05-14T00:44:29.075827639Z" level=error msg="Failed to destroy network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.077950 env[1221]: time="2025-05-14T00:44:29.076193098Z" level=error msg="encountered an error cleaning up failed sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.077950 env[1221]: time="2025-05-14T00:44:29.076239985Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-q7gw2,Uid:fdcb9a54-9cbc-4a77-a30d-0868729ac8ed,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.078031 kubelet[1957]: E0514 00:44:29.077843 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.078031 kubelet[1957]: E0514 00:44:29.077921 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-q7gw2" May 14 00:44:29.078031 kubelet[1957]: E0514 00:44:29.077950 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-q7gw2" May 14 00:44:29.077704 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1-shm.mount: Deactivated successfully. May 14 00:44:29.078221 kubelet[1957]: E0514 00:44:29.077998 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-q7gw2_kube-system(fdcb9a54-9cbc-4a77-a30d-0868729ac8ed)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-q7gw2_kube-system(fdcb9a54-9cbc-4a77-a30d-0868729ac8ed)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-q7gw2" podUID="fdcb9a54-9cbc-4a77-a30d-0868729ac8ed" May 14 00:44:29.090578 env[1221]: time="2025-05-14T00:44:29.090522720Z" level=error msg="Failed to destroy network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.092297 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843-shm.mount: Deactivated successfully. May 14 00:44:29.092759 env[1221]: time="2025-05-14T00:44:29.092706591Z" level=error msg="encountered an error cleaning up failed sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.092805 env[1221]: time="2025-05-14T00:44:29.092763160Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-kv768,Uid:f3b7d914-57dd-4086-aa7d-60f72ce2c022,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.093275 kubelet[1957]: E0514 00:44:29.092983 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.093275 kubelet[1957]: E0514 00:44:29.093030 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-kv768" May 14 00:44:29.093275 kubelet[1957]: E0514 00:44:29.093050 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-kv768" May 14 00:44:29.093426 kubelet[1957]: E0514 00:44:29.093082 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-kv768_kube-system(f3b7d914-57dd-4086-aa7d-60f72ce2c022)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-kv768_kube-system(f3b7d914-57dd-4086-aa7d-60f72ce2c022)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-kv768" podUID="f3b7d914-57dd-4086-aa7d-60f72ce2c022" May 14 00:44:29.695994 kubelet[1957]: I0514 00:44:29.695964 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:44:29.697769 env[1221]: time="2025-05-14T00:44:29.697732405Z" level=info msg="StopPodSandbox for \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\"" May 14 00:44:29.698955 kubelet[1957]: I0514 00:44:29.698623 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:44:29.699095 env[1221]: time="2025-05-14T00:44:29.699061579Z" level=info msg="StopPodSandbox for \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\"" May 14 00:44:29.723414 env[1221]: time="2025-05-14T00:44:29.723339680Z" level=error msg="StopPodSandbox for \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\" failed" error="failed to destroy network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.723658 kubelet[1957]: E0514 00:44:29.723607 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:44:29.723721 kubelet[1957]: E0514 00:44:29.723661 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843"} May 14 00:44:29.723721 kubelet[1957]: E0514 00:44:29.723710 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f3b7d914-57dd-4086-aa7d-60f72ce2c022\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:44:29.723808 kubelet[1957]: E0514 00:44:29.723731 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f3b7d914-57dd-4086-aa7d-60f72ce2c022\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-kv768" podUID="f3b7d914-57dd-4086-aa7d-60f72ce2c022" May 14 00:44:29.726625 env[1221]: time="2025-05-14T00:44:29.726582921Z" level=error msg="StopPodSandbox for \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\" failed" error="failed to destroy network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 14 00:44:29.726937 kubelet[1957]: E0514 00:44:29.726901 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:44:29.726937 kubelet[1957]: E0514 00:44:29.726937 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1"} May 14 00:44:29.727037 kubelet[1957]: E0514 00:44:29.726960 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fdcb9a54-9cbc-4a77-a30d-0868729ac8ed\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 14 00:44:29.727037 kubelet[1957]: E0514 00:44:29.726980 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fdcb9a54-9cbc-4a77-a30d-0868729ac8ed\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-q7gw2" podUID="fdcb9a54-9cbc-4a77-a30d-0868729ac8ed" May 14 00:44:33.867305 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4095754728.mount: Deactivated successfully. May 14 00:44:33.912120 env[1221]: time="2025-05-14T00:44:33.912050568Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:33.913302 env[1221]: time="2025-05-14T00:44:33.913266894Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:33.914815 env[1221]: time="2025-05-14T00:44:33.914779180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:33.916353 env[1221]: time="2025-05-14T00:44:33.916313828Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:33.916728 env[1221]: time="2025-05-14T00:44:33.916701401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 14 00:44:33.933657 env[1221]: time="2025-05-14T00:44:33.933075029Z" level=info msg="CreateContainer within sandbox \"fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 14 00:44:33.947061 env[1221]: time="2025-05-14T00:44:33.947012485Z" level=info msg="CreateContainer within sandbox \"fcc197c1034e6fb75a0d77cb7c7892b7c60ee1bff354cf12755f6b233fa3a545\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7dc5816bfed77a6380118bcffa3d982bd25239c34b388289fea1bf5b62c7f415\"" May 14 00:44:33.947704 env[1221]: time="2025-05-14T00:44:33.947670055Z" level=info msg="StartContainer for \"7dc5816bfed77a6380118bcffa3d982bd25239c34b388289fea1bf5b62c7f415\"" May 14 00:44:33.970272 systemd[1]: Started cri-containerd-7dc5816bfed77a6380118bcffa3d982bd25239c34b388289fea1bf5b62c7f415.scope. May 14 00:44:33.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.73:22-10.0.0.1:33640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:33.989058 systemd[1]: Started sshd@7-10.0.0.73:22-10.0.0.1:33640.service. May 14 00:44:33.996866 kernel: audit: type=1130 audit(1747183473.988:981): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.73:22-10.0.0.1:33640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:34.026000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2408 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:34.041566 kernel: audit: type=1400 audit(1747183474.026:982): avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.041652 kernel: audit: type=1300 audit(1747183474.026:982): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2408 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:34.041676 kernel: audit: type=1327 audit(1747183474.026:982): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633538313662666564373761363338303131386263666661336439 May 14 00:44:34.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633538313662666564373761363338303131386263666661336439 May 14 00:44:34.043868 kernel: audit: type=1400 audit(1747183474.026:983): avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.045481 kernel: audit: type=1400 audit(1747183474.026:983): avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.047124 kernel: audit: type=1400 audit(1747183474.026:983): avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048739 kernel: audit: type=1400 audit(1747183474.026:983): avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.056304 kernel: audit: type=1400 audit(1747183474.026:983): avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.056354 kernel: audit: type=1400 audit(1747183474.026:983): avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.026000 audit: BPF prog-id=133 op=LOAD May 14 00:44:34.026000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2408 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:34.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633538313662666564373761363338303131386263666661336439 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.033000 audit: BPF prog-id=134 op=LOAD May 14 00:44:34.033000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2408 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:34.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633538313662666564373761363338303131386263666661336439 May 14 00:44:34.048000 audit: BPF prog-id=134 op=UNLOAD May 14 00:44:34.048000 audit: BPF prog-id=133 op=UNLOAD May 14 00:44:34.048000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:34.048000 audit: BPF prog-id=135 op=LOAD May 14 00:44:34.048000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2408 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:34.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633538313662666564373761363338303131386263666661336439 May 14 00:44:34.076905 env[1221]: time="2025-05-14T00:44:34.076860637Z" level=info msg="StartContainer for \"7dc5816bfed77a6380118bcffa3d982bd25239c34b388289fea1bf5b62c7f415\" returns successfully" May 14 00:44:34.107000 audit[3067]: USER_ACCT pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:34.108783 sshd[3067]: Accepted publickey for core from 10.0.0.1 port 33640 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:44:34.114000 audit[3067]: CRED_ACQ pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:34.114000 audit[3067]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2791100 a2=3 a3=1 items=0 ppid=1 pid=3067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:34.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:44:34.116367 sshd[3067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:44:34.122204 systemd[1]: Started session-8.scope. May 14 00:44:34.122391 systemd-logind[1209]: New session 8 of user core. May 14 00:44:34.126000 audit[3067]: USER_START pid=3067 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:34.128000 audit[3083]: CRED_ACQ pid=3083 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:34.320883 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 14 00:44:34.321055 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 14 00:44:34.411329 sshd[3067]: pam_unix(sshd:session): session closed for user core May 14 00:44:34.410000 audit[3067]: USER_END pid=3067 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:34.411000 audit[3067]: CRED_DISP pid=3067 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:34.414330 systemd[1]: sshd@7-10.0.0.73:22-10.0.0.1:33640.service: Deactivated successfully. May 14 00:44:34.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.73:22-10.0.0.1:33640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:34.415089 systemd[1]: session-8.scope: Deactivated successfully. May 14 00:44:34.415630 systemd-logind[1209]: Session 8 logged out. Waiting for processes to exit. May 14 00:44:34.416312 systemd-logind[1209]: Removed session 8. May 14 00:44:34.710180 kubelet[1957]: E0514 00:44:34.710087 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:34.727558 kubelet[1957]: I0514 00:44:34.726993 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-hsf4b" podStartSLOduration=1.555656512 podStartE2EDuration="14.726978574s" podCreationTimestamp="2025-05-14 00:44:20 +0000 UTC" firstStartedPulling="2025-05-14 00:44:20.746463727 +0000 UTC m=+14.223262847" lastFinishedPulling="2025-05-14 00:44:33.917785789 +0000 UTC m=+27.394584909" observedRunningTime="2025-05-14 00:44:34.726680975 +0000 UTC m=+28.203480095" watchObservedRunningTime="2025-05-14 00:44:34.726978574 +0000 UTC m=+28.203777774" May 14 00:44:35.619000 audit[3195]: AVC avc: denied { write } for pid=3195 comm="tee" name="fd" dev="proc" ino=17130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:44:35.619000 audit[3195]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff9fb5a1a a2=241 a3=1b6 items=1 ppid=3146 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:35.619000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 14 00:44:35.619000 audit: PATH item=0 name="/dev/fd/63" inode=19599 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:44:35.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:44:35.626000 audit[3204]: AVC avc: denied { write } for pid=3204 comm="tee" name="fd" dev="proc" ino=17134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:44:35.626000 audit[3204]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3fdba2a a2=241 a3=1b6 items=1 ppid=3143 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:35.626000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 14 00:44:35.626000 audit: PATH item=0 name="/dev/fd/63" inode=17129 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:44:35.626000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:44:35.628000 audit[3206]: AVC avc: denied { write } for pid=3206 comm="tee" name="fd" dev="proc" ino=17138 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:44:35.628000 audit[3206]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffefb2aa2a a2=241 a3=1b6 items=1 ppid=3147 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:35.628000 audit: CWD cwd="/etc/service/enabled/felix/log" May 14 00:44:35.628000 audit: PATH item=0 name="/dev/fd/63" inode=19600 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:44:35.628000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:44:35.632000 audit[3213]: AVC avc: denied { write } for pid=3213 comm="tee" name="fd" dev="proc" ino=17144 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:44:35.632000 audit[3213]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd17aca2a a2=241 a3=1b6 items=1 ppid=3137 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:35.632000 audit: CWD cwd="/etc/service/enabled/confd/log" May 14 00:44:35.632000 audit: PATH item=0 name="/dev/fd/63" inode=19601 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:44:35.632000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:44:35.633000 audit[3215]: AVC avc: denied { write } for pid=3215 comm="tee" name="fd" dev="proc" ino=17148 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:44:35.633000 audit[3215]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffdf1aa1b a2=241 a3=1b6 items=1 ppid=3145 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:35.633000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 14 00:44:35.633000 audit: PATH item=0 name="/dev/fd/63" inode=19602 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:44:35.633000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:44:35.643000 audit[3201]: AVC avc: denied { write } for pid=3201 comm="tee" name="fd" dev="proc" ino=19605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:44:35.643000 audit[3201]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdffbba2b a2=241 a3=1b6 items=1 ppid=3151 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:35.643000 audit: CWD cwd="/etc/service/enabled/bird/log" May 14 00:44:35.643000 audit: PATH item=0 name="/dev/fd/63" inode=19102 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:44:35.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:44:35.649000 audit[3209]: AVC avc: denied { write } for pid=3209 comm="tee" name="fd" dev="proc" ino=18150 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 14 00:44:35.649000 audit[3209]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcbb82a2c a2=241 a3=1b6 items=1 ppid=3138 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:35.649000 audit: CWD cwd="/etc/service/enabled/cni/log" May 14 00:44:35.649000 audit: PATH item=0 name="/dev/fd/63" inode=19109 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 14 00:44:35.649000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 14 00:44:35.711097 kubelet[1957]: I0514 00:44:35.711062 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:44:35.711471 kubelet[1957]: E0514 00:44:35.711442 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:38.820023 kubelet[1957]: I0514 00:44:38.819982 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:44:38.820415 kubelet[1957]: E0514 00:44:38.820376 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:39.415265 systemd[1]: Started sshd@8-10.0.0.73:22-10.0.0.1:33648.service. May 14 00:44:39.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.73:22-10.0.0.1:33648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:39.416136 kernel: kauditd_printk_skb: 79 callbacks suppressed May 14 00:44:39.416194 kernel: audit: type=1130 audit(1747183479.414:1003): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.73:22-10.0.0.1:33648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:39.467000 audit[3344]: USER_ACCT pid=3344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.468141 sshd[3344]: Accepted publickey for core from 10.0.0.1 port 33648 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:44:39.469614 sshd[3344]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:44:39.468000 audit[3344]: CRED_ACQ pid=3344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.472492 kernel: audit: type=1101 audit(1747183479.467:1004): pid=3344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.472570 kernel: audit: type=1103 audit(1747183479.468:1005): pid=3344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.472609 kernel: audit: type=1006 audit(1747183479.468:1006): pid=3344 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 14 00:44:39.473853 kernel: audit: type=1300 audit(1747183479.468:1006): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff573d5a0 a2=3 a3=1 items=0 ppid=1 pid=3344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:39.468000 audit[3344]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff573d5a0 a2=3 a3=1 items=0 ppid=1 pid=3344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:39.476179 systemd[1]: Started session-9.scope. May 14 00:44:39.468000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:44:39.476502 systemd-logind[1209]: New session 9 of user core. May 14 00:44:39.476957 kernel: audit: type=1327 audit(1747183479.468:1006): proctitle=737368643A20636F7265205B707269765D May 14 00:44:39.479000 audit[3344]: USER_START pid=3344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.480000 audit[3346]: CRED_ACQ pid=3346 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.484872 kernel: audit: type=1105 audit(1747183479.479:1007): pid=3344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.484960 kernel: audit: type=1103 audit(1747183479.480:1008): pid=3346 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.599132 sshd[3344]: pam_unix(sshd:session): session closed for user core May 14 00:44:39.599000 audit[3344]: USER_END pid=3344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.602202 systemd[1]: sshd@8-10.0.0.73:22-10.0.0.1:33648.service: Deactivated successfully. May 14 00:44:39.602917 systemd[1]: session-9.scope: Deactivated successfully. May 14 00:44:39.602973 systemd-logind[1209]: Session 9 logged out. Waiting for processes to exit. May 14 00:44:39.599000 audit[3344]: CRED_DISP pid=3344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.604319 systemd-logind[1209]: Removed session 9. May 14 00:44:39.605528 kernel: audit: type=1106 audit(1747183479.599:1009): pid=3344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.605600 kernel: audit: type=1104 audit(1747183479.599:1010): pid=3344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:39.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.73:22-10.0.0.1:33648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:40.616470 env[1221]: time="2025-05-14T00:44:40.616426437Z" level=info msg="StopPodSandbox for \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\"" May 14 00:44:40.616824 env[1221]: time="2025-05-14T00:44:40.616771954Z" level=info msg="StopPodSandbox for \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\"" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.700 [INFO][3424] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.701 [INFO][3424] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" iface="eth0" netns="/var/run/netns/cni-0c7320e6-d3dd-60d4-7df0-febdee4c9521" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.701 [INFO][3424] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" iface="eth0" netns="/var/run/netns/cni-0c7320e6-d3dd-60d4-7df0-febdee4c9521" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.702 [INFO][3424] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" iface="eth0" netns="/var/run/netns/cni-0c7320e6-d3dd-60d4-7df0-febdee4c9521" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.702 [INFO][3424] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.702 [INFO][3424] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.818 [INFO][3442] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.818 [INFO][3442] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.818 [INFO][3442] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.833 [WARNING][3442] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.833 [INFO][3442] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.835 [INFO][3442] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:40.843967 env[1221]: 2025-05-14 00:44:40.841 [INFO][3424] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:44:40.851902 env[1221]: time="2025-05-14T00:44:40.850004160Z" level=info msg="TearDown network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\" successfully" May 14 00:44:40.851902 env[1221]: time="2025-05-14T00:44:40.850046845Z" level=info msg="StopPodSandbox for \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\" returns successfully" May 14 00:44:40.851510 systemd[1]: run-netns-cni\x2d0c7320e6\x2dd3dd\x2d60d4\x2d7df0\x2dfebdee4c9521.mount: Deactivated successfully. May 14 00:44:40.852749 env[1221]: time="2025-05-14T00:44:40.852721127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fd6c7cdf6-pnvfg,Uid:76d26012-d4dd-4f9e-8998-4a7a2c75c980,Namespace:calico-apiserver,Attempt:1,}" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.701 [INFO][3423] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.701 [INFO][3423] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" iface="eth0" netns="/var/run/netns/cni-628417f3-af1e-7058-0604-2e8537a8c9dd" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.702 [INFO][3423] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" iface="eth0" netns="/var/run/netns/cni-628417f3-af1e-7058-0604-2e8537a8c9dd" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.702 [INFO][3423] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" iface="eth0" netns="/var/run/netns/cni-628417f3-af1e-7058-0604-2e8537a8c9dd" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.702 [INFO][3423] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.702 [INFO][3423] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.819 [INFO][3441] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.819 [INFO][3441] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.835 [INFO][3441] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.864 [WARNING][3441] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.864 [INFO][3441] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.866 [INFO][3441] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:40.873354 env[1221]: 2025-05-14 00:44:40.868 [INFO][3423] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:44:40.873354 env[1221]: time="2025-05-14T00:44:40.873142605Z" level=info msg="TearDown network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\" successfully" May 14 00:44:40.873354 env[1221]: time="2025-05-14T00:44:40.873184930Z" level=info msg="StopPodSandbox for \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\" returns successfully" May 14 00:44:40.872754 systemd[1]: run-netns-cni\x2d628417f3\x2daf1e\x2d7058\x2d0604\x2d2e8537a8c9dd.mount: Deactivated successfully. May 14 00:44:40.874537 env[1221]: time="2025-05-14T00:44:40.874386057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-whxp8,Uid:94f1513e-4d14-4aa4-9b49-2068e28e7d02,Namespace:calico-system,Attempt:1,}" May 14 00:44:41.076787 kubelet[1957]: I0514 00:44:41.076747 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:44:41.077159 kubelet[1957]: E0514 00:44:41.077111 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:41.119000 audit[3524]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:41.119000 audit[3524]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffdae07fd0 a2=0 a3=1 items=0 ppid=2106 pid=3524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:41.129000 audit[3524]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:41.129000 audit[3524]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffdae07fd0 a2=0 a3=1 items=0 ppid=2106 pid=3524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:41.132644 systemd-networkd[1048]: cali8f045d753a1: Link UP May 14 00:44:41.134310 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:44:41.134446 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8f045d753a1: link becomes ready May 14 00:44:41.138672 systemd-networkd[1048]: cali8f045d753a1: Gained carrier May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:40.980 [INFO][3477] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:40.996 [INFO][3477] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0 calico-apiserver-7fd6c7cdf6- calico-apiserver 76d26012-d4dd-4f9e-8998-4a7a2c75c980 853 0 2025-05-14 00:44:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7fd6c7cdf6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7fd6c7cdf6-pnvfg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8f045d753a1 [] []}} ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-pnvfg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:40.996 [INFO][3477] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-pnvfg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.026 [INFO][3507] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" HandleID="k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.053 [INFO][3507] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" HandleID="k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002e4550), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7fd6c7cdf6-pnvfg", "timestamp":"2025-05-14 00:44:41.026968294 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.054 [INFO][3507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.054 [INFO][3507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.058 [INFO][3507] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.060 [INFO][3507] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.072 [INFO][3507] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.089 [INFO][3507] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.091 [INFO][3507] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.093 [INFO][3507] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.093 [INFO][3507] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.097 [INFO][3507] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.104 [INFO][3507] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.116 [INFO][3507] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.117 [INFO][3507] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" host="localhost" May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.117 [INFO][3507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:41.155761 env[1221]: 2025-05-14 00:44:41.117 [INFO][3507] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" HandleID="k8s-pod-network.b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:41.156404 env[1221]: 2025-05-14 00:44:41.120 [INFO][3477] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-pnvfg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0", GenerateName:"calico-apiserver-7fd6c7cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"76d26012-d4dd-4f9e-8998-4a7a2c75c980", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fd6c7cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7fd6c7cdf6-pnvfg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8f045d753a1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:41.156404 env[1221]: 2025-05-14 00:44:41.120 [INFO][3477] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-pnvfg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:41.156404 env[1221]: 2025-05-14 00:44:41.120 [INFO][3477] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8f045d753a1 ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-pnvfg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:41.156404 env[1221]: 2025-05-14 00:44:41.139 [INFO][3477] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-pnvfg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:41.156404 env[1221]: 2025-05-14 00:44:41.139 [INFO][3477] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-pnvfg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0", GenerateName:"calico-apiserver-7fd6c7cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"76d26012-d4dd-4f9e-8998-4a7a2c75c980", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fd6c7cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f", Pod:"calico-apiserver-7fd6c7cdf6-pnvfg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8f045d753a1", MAC:"2a:18:28:73:d9:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:41.156404 env[1221]: 2025-05-14 00:44:41.152 [INFO][3477] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-pnvfg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:44:41.172822 env[1221]: time="2025-05-14T00:44:41.172744734Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:41.172822 env[1221]: time="2025-05-14T00:44:41.172784498Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:41.172822 env[1221]: time="2025-05-14T00:44:41.172795259Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:41.173264 env[1221]: time="2025-05-14T00:44:41.173224943Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f pid=3549 runtime=io.containerd.runc.v2 May 14 00:44:41.211065 systemd[1]: Started cri-containerd-b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f.scope. May 14 00:44:41.238983 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic85be739274: link becomes ready May 14 00:44:41.236961 systemd-networkd[1048]: calic85be739274: Link UP May 14 00:44:41.238091 systemd-networkd[1048]: calic85be739274: Gained carrier May 14 00:44:41.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.242000 audit: BPF prog-id=136 op=LOAD May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3549 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230616362363532623133646266346233623866626139383362383632 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3549 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230616362363532623133646266346233623866626139383362383632 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit: BPF prog-id=137 op=LOAD May 14 00:44:41.243000 audit[3559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3549 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230616362363532623133646266346233623866626139383362383632 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit: BPF prog-id=138 op=LOAD May 14 00:44:41.243000 audit[3559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3549 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230616362363532623133646266346233623866626139383362383632 May 14 00:44:41.243000 audit: BPF prog-id=138 op=UNLOAD May 14 00:44:41.243000 audit: BPF prog-id=137 op=UNLOAD May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { perfmon } for pid=3559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit[3559]: AVC avc: denied { bpf } for pid=3559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.243000 audit: BPF prog-id=139 op=LOAD May 14 00:44:41.243000 audit[3559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3549 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230616362363532623133646266346233623866626139383362383632 May 14 00:44:41.246734 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:40.981 [INFO][3488] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:40.999 [INFO][3488] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--whxp8-eth0 csi-node-driver- calico-system 94f1513e-4d14-4aa4-9b49-2068e28e7d02 854 0 2025-05-14 00:44:20 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-whxp8 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic85be739274 [] []}} ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Namespace="calico-system" Pod="csi-node-driver-whxp8" WorkloadEndpoint="localhost-k8s-csi--node--driver--whxp8-" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:40.999 [INFO][3488] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Namespace="calico-system" Pod="csi-node-driver-whxp8" WorkloadEndpoint="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.028 [INFO][3509] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" HandleID="k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.053 [INFO][3509] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" HandleID="k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000369620), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-whxp8", "timestamp":"2025-05-14 00:44:41.028737635 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.053 [INFO][3509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.117 [INFO][3509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.117 [INFO][3509] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.161 [INFO][3509] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.167 [INFO][3509] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.178 [INFO][3509] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.180 [INFO][3509] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.182 [INFO][3509] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.182 [INFO][3509] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.210 [INFO][3509] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.219 [INFO][3509] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.231 [INFO][3509] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.231 [INFO][3509] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" host="localhost" May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.231 [INFO][3509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:41.254310 env[1221]: 2025-05-14 00:44:41.231 [INFO][3509] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" HandleID="k8s-pod-network.b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:41.255434 env[1221]: 2025-05-14 00:44:41.234 [INFO][3488] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Namespace="calico-system" Pod="csi-node-driver-whxp8" WorkloadEndpoint="localhost-k8s-csi--node--driver--whxp8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--whxp8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"94f1513e-4d14-4aa4-9b49-2068e28e7d02", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-whxp8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic85be739274", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:41.255434 env[1221]: 2025-05-14 00:44:41.234 [INFO][3488] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Namespace="calico-system" Pod="csi-node-driver-whxp8" WorkloadEndpoint="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:41.255434 env[1221]: 2025-05-14 00:44:41.234 [INFO][3488] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic85be739274 ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Namespace="calico-system" Pod="csi-node-driver-whxp8" WorkloadEndpoint="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:41.255434 env[1221]: 2025-05-14 00:44:41.238 [INFO][3488] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Namespace="calico-system" Pod="csi-node-driver-whxp8" WorkloadEndpoint="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:41.255434 env[1221]: 2025-05-14 00:44:41.242 [INFO][3488] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Namespace="calico-system" Pod="csi-node-driver-whxp8" WorkloadEndpoint="localhost-k8s-csi--node--driver--whxp8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--whxp8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"94f1513e-4d14-4aa4-9b49-2068e28e7d02", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf", Pod:"csi-node-driver-whxp8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic85be739274", MAC:"3a:ef:72:56:b6:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:41.255434 env[1221]: 2025-05-14 00:44:41.252 [INFO][3488] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf" Namespace="calico-system" Pod="csi-node-driver-whxp8" WorkloadEndpoint="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:44:41.269531 env[1221]: time="2025-05-14T00:44:41.269486315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fd6c7cdf6-pnvfg,Uid:76d26012-d4dd-4f9e-8998-4a7a2c75c980,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f\"" May 14 00:44:41.271576 env[1221]: time="2025-05-14T00:44:41.271543886Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 14 00:44:41.275036 env[1221]: time="2025-05-14T00:44:41.274968236Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:41.275036 env[1221]: time="2025-05-14T00:44:41.275025162Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:41.275186 env[1221]: time="2025-05-14T00:44:41.275041884Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:41.275356 env[1221]: time="2025-05-14T00:44:41.275320232Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf pid=3601 runtime=io.containerd.runc.v2 May 14 00:44:41.286175 systemd[1]: Started cri-containerd-b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf.scope. May 14 00:44:41.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.303000 audit: BPF prog-id=140 op=LOAD May 14 00:44:41.304000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3601 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663165396336663432613335616338616532353865323333393730 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3601 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663165396336663432613335616338616532353865323333393730 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.304000 audit: BPF prog-id=141 op=LOAD May 14 00:44:41.304000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3601 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663165396336663432613335616338616532353865323333393730 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.305000 audit: BPF prog-id=142 op=LOAD May 14 00:44:41.305000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3601 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663165396336663432613335616338616532353865323333393730 May 14 00:44:41.306000 audit: BPF prog-id=142 op=UNLOAD May 14 00:44:41.306000 audit: BPF prog-id=141 op=UNLOAD May 14 00:44:41.306000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { perfmon } for pid=3612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit[3612]: AVC avc: denied { bpf } for pid=3612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.306000 audit: BPF prog-id=143 op=LOAD May 14 00:44:41.306000 audit[3612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3601 pid=3612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238663165396336663432613335616338616532353865323333393730 May 14 00:44:41.308094 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:44:41.317993 env[1221]: time="2025-05-14T00:44:41.317029701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-whxp8,Uid:94f1513e-4d14-4aa4-9b49-2068e28e7d02,Namespace:calico-system,Attempt:1,} returns sandbox id \"b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf\"" May 14 00:44:41.614298 env[1221]: time="2025-05-14T00:44:41.614096545Z" level=info msg="StopPodSandbox for \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\"" May 14 00:44:41.614592 env[1221]: time="2025-05-14T00:44:41.614564353Z" level=info msg="StopPodSandbox for \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\"" May 14 00:44:41.614681 env[1221]: time="2025-05-14T00:44:41.614645402Z" level=info msg="StopPodSandbox for \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\"" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.674 [INFO][3689] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.674 [INFO][3689] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" iface="eth0" netns="/var/run/netns/cni-9e864a6d-50f4-4323-9c8a-1ecbbf0bfecb" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.675 [INFO][3689] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" iface="eth0" netns="/var/run/netns/cni-9e864a6d-50f4-4323-9c8a-1ecbbf0bfecb" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.675 [INFO][3689] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" iface="eth0" netns="/var/run/netns/cni-9e864a6d-50f4-4323-9c8a-1ecbbf0bfecb" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.675 [INFO][3689] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.675 [INFO][3689] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.704 [INFO][3712] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.704 [INFO][3712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.704 [INFO][3712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.712 [WARNING][3712] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.712 [INFO][3712] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.714 [INFO][3712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:41.717381 env[1221]: 2025-05-14 00:44:41.715 [INFO][3689] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:44:41.718066 env[1221]: time="2025-05-14T00:44:41.717490128Z" level=info msg="TearDown network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\" successfully" May 14 00:44:41.718066 env[1221]: time="2025-05-14T00:44:41.717521971Z" level=info msg="StopPodSandbox for \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\" returns successfully" May 14 00:44:41.718422 env[1221]: time="2025-05-14T00:44:41.718390780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78778d7d95-szsq8,Uid:40e9ab38-4275-4c7c-af02-c469c09d267b,Namespace:calico-system,Attempt:1,}" May 14 00:44:41.723338 kubelet[1957]: E0514 00:44:41.723311 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.679 [INFO][3688] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.679 [INFO][3688] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" iface="eth0" netns="/var/run/netns/cni-5eff418e-dfdd-8248-44c7-3894c9c1a526" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.679 [INFO][3688] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" iface="eth0" netns="/var/run/netns/cni-5eff418e-dfdd-8248-44c7-3894c9c1a526" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.679 [INFO][3688] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" iface="eth0" netns="/var/run/netns/cni-5eff418e-dfdd-8248-44c7-3894c9c1a526" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.679 [INFO][3688] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.679 [INFO][3688] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.705 [INFO][3725] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.705 [INFO][3725] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.714 [INFO][3725] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.723 [WARNING][3725] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.723 [INFO][3725] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.726 [INFO][3725] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:41.730070 env[1221]: 2025-05-14 00:44:41.728 [INFO][3688] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:44:41.732969 env[1221]: time="2025-05-14T00:44:41.732921667Z" level=info msg="TearDown network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\" successfully" May 14 00:44:41.733083 env[1221]: time="2025-05-14T00:44:41.733065642Z" level=info msg="StopPodSandbox for \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\" returns successfully" May 14 00:44:41.733786 env[1221]: time="2025-05-14T00:44:41.733754672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fd6c7cdf6-22ps2,Uid:4b452a49-73dd-4786-b4d1-3d70d68f9bf5,Namespace:calico-apiserver,Attempt:1,}" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.674 [INFO][3690] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.674 [INFO][3690] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" iface="eth0" netns="/var/run/netns/cni-123cf15a-cc24-8d88-b1f2-e44070292464" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.674 [INFO][3690] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" iface="eth0" netns="/var/run/netns/cni-123cf15a-cc24-8d88-b1f2-e44070292464" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.675 [INFO][3690] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" iface="eth0" netns="/var/run/netns/cni-123cf15a-cc24-8d88-b1f2-e44070292464" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.676 [INFO][3690] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.676 [INFO][3690] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.713 [INFO][3714] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.713 [INFO][3714] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.726 [INFO][3714] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.735 [WARNING][3714] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.735 [INFO][3714] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.737 [INFO][3714] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:41.740485 env[1221]: 2025-05-14 00:44:41.739 [INFO][3690] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:44:41.740841 env[1221]: time="2025-05-14T00:44:41.740593652Z" level=info msg="TearDown network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\" successfully" May 14 00:44:41.740841 env[1221]: time="2025-05-14T00:44:41.740618815Z" level=info msg="StopPodSandbox for \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\" returns successfully" May 14 00:44:41.740906 kubelet[1957]: E0514 00:44:41.740880 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:41.741172 env[1221]: time="2025-05-14T00:44:41.741145269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-kv768,Uid:f3b7d914-57dd-4086-aa7d-60f72ce2c022,Namespace:kube-system,Attempt:1,}" May 14 00:44:41.854745 systemd[1]: run-netns-cni\x2d123cf15a\x2dcc24\x2d8d88\x2db1f2\x2de44070292464.mount: Deactivated successfully. May 14 00:44:41.854835 systemd[1]: run-netns-cni\x2d9e864a6d\x2d50f4\x2d4323\x2d9c8a\x2d1ecbbf0bfecb.mount: Deactivated successfully. May 14 00:44:41.854895 systemd[1]: run-netns-cni\x2d5eff418e\x2ddfdd\x2d8248\x2d44c7\x2d3894c9c1a526.mount: Deactivated successfully. May 14 00:44:41.923353 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid0ef59f4fac: link becomes ready May 14 00:44:41.922048 systemd-networkd[1048]: calid0ef59f4fac: Link UP May 14 00:44:41.922514 systemd-networkd[1048]: calid0ef59f4fac: Gained carrier May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.806 [INFO][3737] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.818 [INFO][3737] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0 calico-apiserver-7fd6c7cdf6- calico-apiserver 4b452a49-73dd-4786-b4d1-3d70d68f9bf5 885 0 2025-05-14 00:44:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7fd6c7cdf6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7fd6c7cdf6-22ps2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid0ef59f4fac [] []}} ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-22ps2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.819 [INFO][3737] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-22ps2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.869 [INFO][3786] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" HandleID="k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.889 [INFO][3786] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" HandleID="k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003927c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7fd6c7cdf6-22ps2", "timestamp":"2025-05-14 00:44:41.869122847 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.889 [INFO][3786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.889 [INFO][3786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.889 [INFO][3786] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.891 [INFO][3786] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.895 [INFO][3786] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.898 [INFO][3786] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.900 [INFO][3786] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.902 [INFO][3786] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.902 [INFO][3786] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.905 [INFO][3786] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078 May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.909 [INFO][3786] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.917 [INFO][3786] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.917 [INFO][3786] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" host="localhost" May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.917 [INFO][3786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:41.938077 env[1221]: 2025-05-14 00:44:41.917 [INFO][3786] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" HandleID="k8s-pod-network.63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.938665 env[1221]: 2025-05-14 00:44:41.920 [INFO][3737] cni-plugin/k8s.go 386: Populated endpoint ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-22ps2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0", GenerateName:"calico-apiserver-7fd6c7cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b452a49-73dd-4786-b4d1-3d70d68f9bf5", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fd6c7cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7fd6c7cdf6-22ps2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid0ef59f4fac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:41.938665 env[1221]: 2025-05-14 00:44:41.920 [INFO][3737] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-22ps2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.938665 env[1221]: 2025-05-14 00:44:41.920 [INFO][3737] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid0ef59f4fac ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-22ps2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.938665 env[1221]: 2025-05-14 00:44:41.923 [INFO][3737] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-22ps2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.938665 env[1221]: 2025-05-14 00:44:41.924 [INFO][3737] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-22ps2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0", GenerateName:"calico-apiserver-7fd6c7cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b452a49-73dd-4786-b4d1-3d70d68f9bf5", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fd6c7cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078", Pod:"calico-apiserver-7fd6c7cdf6-22ps2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid0ef59f4fac", MAC:"d6:00:10:6b:d6:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:41.938665 env[1221]: 2025-05-14 00:44:41.934 [INFO][3737] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078" Namespace="calico-apiserver" Pod="calico-apiserver-7fd6c7cdf6-22ps2" WorkloadEndpoint="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:44:41.947000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.947000 audit: BPF prog-id=144 op=LOAD May 14 00:44:41.947000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeebb5c58 a2=98 a3=ffffeebb5c48 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.947000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:41.947000 audit: BPF prog-id=144 op=UNLOAD May 14 00:44:41.949000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit: BPF prog-id=145 op=LOAD May 14 00:44:41.949000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeebb58e8 a2=74 a3=95 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.949000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:41.949000 audit: BPF prog-id=145 op=UNLOAD May 14 00:44:41.949000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:41.949000 audit: BPF prog-id=146 op=LOAD May 14 00:44:41.949000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeebb5948 a2=94 a3=2 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:41.949000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:41.949000 audit: BPF prog-id=146 op=UNLOAD May 14 00:44:41.959787 env[1221]: time="2025-05-14T00:44:41.959697957Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:41.959787 env[1221]: time="2025-05-14T00:44:41.959740361Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:41.959787 env[1221]: time="2025-05-14T00:44:41.959756403Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:41.960018 env[1221]: time="2025-05-14T00:44:41.959965945Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078 pid=3859 runtime=io.containerd.runc.v2 May 14 00:44:41.989555 systemd[1]: Started cri-containerd-63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078.scope. May 14 00:44:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit: BPF prog-id=147 op=LOAD May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3859 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633303939623738356361383666643262386636626163333837396363 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3859 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633303939623738356361383666643262386636626163333837396363 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit: BPF prog-id=148 op=LOAD May 14 00:44:42.015000 audit[3872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3859 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633303939623738356361383666643262386636626163333837396363 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.015000 audit: BPF prog-id=149 op=LOAD May 14 00:44:42.015000 audit[3872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3859 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633303939623738356361383666643262386636626163333837396363 May 14 00:44:42.015000 audit: BPF prog-id=149 op=UNLOAD May 14 00:44:42.015000 audit: BPF prog-id=148 op=UNLOAD May 14 00:44:42.016000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.016000 audit: BPF prog-id=150 op=LOAD May 14 00:44:42.016000 audit[3872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3859 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633303939623738356361383666643262386636626163333837396363 May 14 00:44:42.028567 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:44:42.047687 systemd-networkd[1048]: cali6abb75dc84f: Link UP May 14 00:44:42.050878 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6abb75dc84f: link becomes ready May 14 00:44:42.051062 systemd-networkd[1048]: cali6abb75dc84f: Gained carrier May 14 00:44:42.055826 env[1221]: time="2025-05-14T00:44:42.055630365Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fd6c7cdf6-22ps2,Uid:4b452a49-73dd-4786-b4d1-3d70d68f9bf5,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078\"" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.804 [INFO][3746] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.826 [INFO][3746] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0 calico-kube-controllers-78778d7d95- calico-system 40e9ab38-4275-4c7c-af02-c469c09d267b 883 0 2025-05-14 00:44:20 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:78778d7d95 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-78778d7d95-szsq8 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6abb75dc84f [] []}} ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Namespace="calico-system" Pod="calico-kube-controllers-78778d7d95-szsq8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.827 [INFO][3746] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Namespace="calico-system" Pod="calico-kube-controllers-78778d7d95-szsq8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.880 [INFO][3790] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" HandleID="k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.891 [INFO][3790] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" HandleID="k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000440460), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-78778d7d95-szsq8", "timestamp":"2025-05-14 00:44:41.880909173 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.891 [INFO][3790] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.917 [INFO][3790] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.917 [INFO][3790] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:41.992 [INFO][3790] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.003 [INFO][3790] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.016 [INFO][3790] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.024 [INFO][3790] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.029 [INFO][3790] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.030 [INFO][3790] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.031 [INFO][3790] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.035 [INFO][3790] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.041 [INFO][3790] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.041 [INFO][3790] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" host="localhost" May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.041 [INFO][3790] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:42.067352 env[1221]: 2025-05-14 00:44:42.041 [INFO][3790] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" HandleID="k8s-pod-network.f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:42.068008 env[1221]: 2025-05-14 00:44:42.046 [INFO][3746] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Namespace="calico-system" Pod="calico-kube-controllers-78778d7d95-szsq8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0", GenerateName:"calico-kube-controllers-78778d7d95-", Namespace:"calico-system", SelfLink:"", UID:"40e9ab38-4275-4c7c-af02-c469c09d267b", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78778d7d95", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-78778d7d95-szsq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6abb75dc84f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:42.068008 env[1221]: 2025-05-14 00:44:42.046 [INFO][3746] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Namespace="calico-system" Pod="calico-kube-controllers-78778d7d95-szsq8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:42.068008 env[1221]: 2025-05-14 00:44:42.046 [INFO][3746] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6abb75dc84f ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Namespace="calico-system" Pod="calico-kube-controllers-78778d7d95-szsq8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:42.068008 env[1221]: 2025-05-14 00:44:42.048 [INFO][3746] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Namespace="calico-system" Pod="calico-kube-controllers-78778d7d95-szsq8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:42.068008 env[1221]: 2025-05-14 00:44:42.048 [INFO][3746] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Namespace="calico-system" Pod="calico-kube-controllers-78778d7d95-szsq8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0", GenerateName:"calico-kube-controllers-78778d7d95-", Namespace:"calico-system", SelfLink:"", UID:"40e9ab38-4275-4c7c-af02-c469c09d267b", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78778d7d95", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a", Pod:"calico-kube-controllers-78778d7d95-szsq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6abb75dc84f", MAC:"8e:74:0f:c5:e3:99", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:42.068008 env[1221]: 2025-05-14 00:44:42.065 [INFO][3746] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a" Namespace="calico-system" Pod="calico-kube-controllers-78778d7d95-szsq8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:44:42.085318 env[1221]: time="2025-05-14T00:44:42.085105810Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:42.085318 env[1221]: time="2025-05-14T00:44:42.085153294Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:42.085318 env[1221]: time="2025-05-14T00:44:42.085170616Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:42.085658 env[1221]: time="2025-05-14T00:44:42.085623501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a pid=3941 runtime=io.containerd.runc.v2 May 14 00:44:42.097138 systemd[1]: Started cri-containerd-f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a.scope. May 14 00:44:42.114000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.114000 audit: BPF prog-id=151 op=LOAD May 14 00:44:42.114000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeebb5908 a2=40 a3=ffffeebb5938 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.114000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.117000 audit: BPF prog-id=151 op=UNLOAD May 14 00:44:42.117000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.117000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeebb5a20 a2=50 a3=0 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.117000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.128000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.128000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeebb5978 a2=28 a3=ffffeebb5aa8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.128000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeebb59a8 a2=28 a3=ffffeebb5ad8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeebb5858 a2=28 a3=ffffeebb5988 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeebb59c8 a2=28 a3=ffffeebb5af8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeebb59a8 a2=28 a3=ffffeebb5ad8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeebb5998 a2=28 a3=ffffeebb5ac8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeebb59c8 a2=28 a3=ffffeebb5af8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeebb59a8 a2=28 a3=ffffeebb5ad8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeebb59c8 a2=28 a3=ffffeebb5af8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeebb5998 a2=28 a3=ffffeebb5ac8 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.129000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.129000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeebb5a18 a2=28 a3=ffffeebb5b58 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.130000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeebb5750 a2=50 a3=0 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.130000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.130000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.130000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit: BPF prog-id=153 op=LOAD May 14 00:44:42.130000 audit: BPF prog-id=152 op=LOAD May 14 00:44:42.130000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeebb5758 a2=94 a3=5 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.130000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.131000 audit: BPF prog-id=152 op=UNLOAD May 14 00:44:42.131000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.131000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeebb5860 a2=50 a3=0 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.131000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffeebb59a8 a2=4 a3=3 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { confidentiality } for pid=3846 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:44:42.132000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeebb5988 a2=94 a3=6 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.132000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3941 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638353261653239313033623039626664343237366634366563356564 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3941 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638353261653239313033623039626664343237366634366563356564 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { perfmon } for pid=3951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { confidentiality } for pid=3846 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:44:42.132000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeebb5158 a2=94 a3=83 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.132000 audit[3951]: AVC avc: denied { bpf } for pid=3951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit: BPF prog-id=154 op=LOAD May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3951]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3941 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638353261653239313033623039626664343237366634366563356564 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.132000 audit[3846]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeebb5158 a2=94 a3=83 items=0 ppid=3781 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.132000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 14 00:44:42.138141 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:44:42.147017 systemd-networkd[1048]: cali6fbb4ef1d1e: Link UP May 14 00:44:42.149895 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 14 00:44:42.149941 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6fbb4ef1d1e: link becomes ready May 14 00:44:42.149465 systemd-networkd[1048]: cali6fbb4ef1d1e: Gained carrier May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit: BPF prog-id=157 op=LOAD May 14 00:44:42.155000 audit[3973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffed943118 a2=98 a3=ffffed943108 items=0 ppid=3781 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.155000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:44:42.155000 audit: BPF prog-id=157 op=UNLOAD May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit: BPF prog-id=158 op=LOAD May 14 00:44:42.155000 audit[3973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffed942fc8 a2=74 a3=95 items=0 ppid=3781 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.155000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:44:42.155000 audit: BPF prog-id=158 op=UNLOAD May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.155000 audit: BPF prog-id=159 op=LOAD May 14 00:44:42.155000 audit[3973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffed942ff8 a2=40 a3=ffffed943028 items=0 ppid=3781 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.155000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 14 00:44:42.155000 audit: BPF prog-id=159 op=UNLOAD May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:41.843 [INFO][3759] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:41.867 [INFO][3759] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--kv768-eth0 coredns-6f6b679f8f- kube-system f3b7d914-57dd-4086-aa7d-60f72ce2c022 884 0 2025-05-14 00:44:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-kv768 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6fbb4ef1d1e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Namespace="kube-system" Pod="coredns-6f6b679f8f-kv768" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kv768-" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:41.867 [INFO][3759] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Namespace="kube-system" Pod="coredns-6f6b679f8f-kv768" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:41.926 [INFO][3811] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" HandleID="k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:41.948 [INFO][3811] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" HandleID="k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004305f0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-kv768", "timestamp":"2025-05-14 00:44:41.926296739 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:41.948 [INFO][3811] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.041 [INFO][3811] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.042 [INFO][3811] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.093 [INFO][3811] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.108 [INFO][3811] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.113 [INFO][3811] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.115 [INFO][3811] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.123 [INFO][3811] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.123 [INFO][3811] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.124 [INFO][3811] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821 May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.129 [INFO][3811] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.135 [INFO][3811] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.135 [INFO][3811] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" host="localhost" May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.135 [INFO][3811] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:42.161364 env[1221]: 2025-05-14 00:44:42.135 [INFO][3811] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" HandleID="k8s-pod-network.ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:42.161977 env[1221]: 2025-05-14 00:44:42.138 [INFO][3759] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Namespace="kube-system" Pod="coredns-6f6b679f8f-kv768" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--kv768-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f3b7d914-57dd-4086-aa7d-60f72ce2c022", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-kv768", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6fbb4ef1d1e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:42.161977 env[1221]: 2025-05-14 00:44:42.138 [INFO][3759] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Namespace="kube-system" Pod="coredns-6f6b679f8f-kv768" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:42.161977 env[1221]: 2025-05-14 00:44:42.138 [INFO][3759] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6fbb4ef1d1e ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Namespace="kube-system" Pod="coredns-6f6b679f8f-kv768" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:42.161977 env[1221]: 2025-05-14 00:44:42.149 [INFO][3759] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Namespace="kube-system" Pod="coredns-6f6b679f8f-kv768" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:42.161977 env[1221]: 2025-05-14 00:44:42.150 [INFO][3759] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Namespace="kube-system" Pod="coredns-6f6b679f8f-kv768" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--kv768-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f3b7d914-57dd-4086-aa7d-60f72ce2c022", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821", Pod:"coredns-6f6b679f8f-kv768", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6fbb4ef1d1e", MAC:"1a:31:7b:00:55:25", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:42.161977 env[1221]: 2025-05-14 00:44:42.158 [INFO][3759] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821" Namespace="kube-system" Pod="coredns-6f6b679f8f-kv768" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:44:42.167339 env[1221]: time="2025-05-14T00:44:42.167293005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78778d7d95-szsq8,Uid:40e9ab38-4275-4c7c-af02-c469c09d267b,Namespace:calico-system,Attempt:1,} returns sandbox id \"f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a\"" May 14 00:44:42.178512 env[1221]: time="2025-05-14T00:44:42.178400267Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:42.178512 env[1221]: time="2025-05-14T00:44:42.178436551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:42.178512 env[1221]: time="2025-05-14T00:44:42.178446712Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:42.178657 env[1221]: time="2025-05-14T00:44:42.178581325Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821 pid=4007 runtime=io.containerd.runc.v2 May 14 00:44:42.200993 systemd[1]: Started cri-containerd-ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821.scope. May 14 00:44:42.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit: BPF prog-id=160 op=LOAD May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4007 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165336535353762646665393337353039393832626230326533326135 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4007 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165336535353762646665393337353039393832626230326533326135 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit: BPF prog-id=161 op=LOAD May 14 00:44:42.236000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4007 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165336535353762646665393337353039393832626230326533326135 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit: BPF prog-id=162 op=LOAD May 14 00:44:42.236000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4007 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165336535353762646665393337353039393832626230326533326135 May 14 00:44:42.236000 audit: BPF prog-id=162 op=UNLOAD May 14 00:44:42.236000 audit: BPF prog-id=161 op=UNLOAD May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.236000 audit: BPF prog-id=163 op=LOAD May 14 00:44:42.236000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4007 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165336535353762646665393337353039393832626230326533326135 May 14 00:44:42.238866 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:44:42.242736 systemd-networkd[1048]: vxlan.calico: Link UP May 14 00:44:42.242743 systemd-networkd[1048]: vxlan.calico: Gained carrier May 14 00:44:42.259173 env[1221]: time="2025-05-14T00:44:42.259133999Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-kv768,Uid:f3b7d914-57dd-4086-aa7d-60f72ce2c022,Namespace:kube-system,Attempt:1,} returns sandbox id \"ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821\"" May 14 00:44:42.260794 kubelet[1957]: E0514 00:44:42.260753 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:42.266600 env[1221]: time="2025-05-14T00:44:42.265903870Z" level=info msg="CreateContainer within sandbox \"ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 14 00:44:42.269000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.269000 audit: BPF prog-id=164 op=LOAD May 14 00:44:42.269000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa6f9348 a2=98 a3=fffffa6f9338 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.270000 audit: BPF prog-id=164 op=UNLOAD May 14 00:44:42.270000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit: BPF prog-id=165 op=LOAD May 14 00:44:42.270000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa6f9028 a2=74 a3=95 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.270000 audit: BPF prog-id=165 op=UNLOAD May 14 00:44:42.270000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.270000 audit: BPF prog-id=166 op=LOAD May 14 00:44:42.270000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa6f9088 a2=94 a3=2 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit: BPF prog-id=166 op=UNLOAD May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa6f90b8 a2=28 a3=fffffa6f91e8 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa6f90e8 a2=28 a3=fffffa6f9218 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa6f8f98 a2=28 a3=fffffa6f90c8 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa6f9108 a2=28 a3=fffffa6f9238 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa6f90e8 a2=28 a3=fffffa6f9218 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa6f90d8 a2=28 a3=fffffa6f9208 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa6f9108 a2=28 a3=fffffa6f9238 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa6f90e8 a2=28 a3=fffffa6f9218 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa6f9108 a2=28 a3=fffffa6f9238 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffa6f90d8 a2=28 a3=fffffa6f9208 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffa6f9158 a2=28 a3=fffffa6f9298 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.271000 audit: BPF prog-id=167 op=LOAD May 14 00:44:42.271000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffa6f8f78 a2=40 a3=fffffa6f8fa8 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.271000 audit: BPF prog-id=167 op=UNLOAD May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffffa6f8fa0 a2=50 a3=0 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffffa6f8fa0 a2=50 a3=0 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit: BPF prog-id=168 op=LOAD May 14 00:44:42.272000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffa6f8708 a2=94 a3=2 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.272000 audit: BPF prog-id=168 op=UNLOAD May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.272000 audit: BPF prog-id=169 op=LOAD May 14 00:44:42.272000 audit[4057]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffa6f8898 a2=94 a3=30 items=0 ppid=3781 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit: BPF prog-id=170 op=LOAD May 14 00:44:42.275000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffccf9f978 a2=98 a3=ffffccf9f968 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.275000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.275000 audit: BPF prog-id=170 op=UNLOAD May 14 00:44:42.275000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.275000 audit: BPF prog-id=171 op=LOAD May 14 00:44:42.275000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffccf9f608 a2=74 a3=95 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.275000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.284000 audit: BPF prog-id=171 op=UNLOAD May 14 00:44:42.284000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.284000 audit: BPF prog-id=172 op=LOAD May 14 00:44:42.284000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffccf9f668 a2=94 a3=2 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.284000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.286000 audit: BPF prog-id=172 op=UNLOAD May 14 00:44:42.302141 env[1221]: time="2025-05-14T00:44:42.302094342Z" level=info msg="CreateContainer within sandbox \"ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"72d58d3a337066f5a7c872483c924085d5b5292bd095c0e6b3900e82f00e9b67\"" May 14 00:44:42.304082 env[1221]: time="2025-05-14T00:44:42.303165168Z" level=info msg="StartContainer for \"72d58d3a337066f5a7c872483c924085d5b5292bd095c0e6b3900e82f00e9b67\"" May 14 00:44:42.322434 systemd[1]: Started cri-containerd-72d58d3a337066f5a7c872483c924085d5b5292bd095c0e6b3900e82f00e9b67.scope. May 14 00:44:42.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit: BPF prog-id=173 op=LOAD May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4007 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732643538643361333337303636663561376338373234383363393234 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4007 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732643538643361333337303636663561376338373234383363393234 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit: BPF prog-id=174 op=LOAD May 14 00:44:42.359000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4007 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732643538643361333337303636663561376338373234383363393234 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit: BPF prog-id=175 op=LOAD May 14 00:44:42.359000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4007 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732643538643361333337303636663561376338373234383363393234 May 14 00:44:42.359000 audit: BPF prog-id=175 op=UNLOAD May 14 00:44:42.359000 audit: BPF prog-id=174 op=UNLOAD May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { perfmon } for pid=4076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit[4076]: AVC avc: denied { bpf } for pid=4076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.359000 audit: BPF prog-id=176 op=LOAD May 14 00:44:42.359000 audit[4076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4007 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732643538643361333337303636663561376338373234383363393234 May 14 00:44:42.393097 env[1221]: time="2025-05-14T00:44:42.393050327Z" level=info msg="StartContainer for \"72d58d3a337066f5a7c872483c924085d5b5292bd095c0e6b3900e82f00e9b67\" returns successfully" May 14 00:44:42.435000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit: BPF prog-id=177 op=LOAD May 14 00:44:42.435000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffccf9f628 a2=40 a3=ffffccf9f658 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.435000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.435000 audit: BPF prog-id=177 op=UNLOAD May 14 00:44:42.435000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.435000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffccf9f740 a2=50 a3=0 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.435000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccf9f698 a2=28 a3=ffffccf9f7c8 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccf9f6c8 a2=28 a3=ffffccf9f7f8 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccf9f578 a2=28 a3=ffffccf9f6a8 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccf9f6e8 a2=28 a3=ffffccf9f818 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccf9f6c8 a2=28 a3=ffffccf9f7f8 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccf9f6b8 a2=28 a3=ffffccf9f7e8 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccf9f6e8 a2=28 a3=ffffccf9f818 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccf9f6c8 a2=28 a3=ffffccf9f7f8 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccf9f6e8 a2=28 a3=ffffccf9f818 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccf9f6b8 a2=28 a3=ffffccf9f7e8 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccf9f738 a2=28 a3=ffffccf9f878 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffccf9f470 a2=50 a3=0 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.448000 audit: BPF prog-id=178 op=LOAD May 14 00:44:42.448000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffccf9f478 a2=94 a3=5 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.449000 audit: BPF prog-id=178 op=UNLOAD May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffccf9f580 a2=50 a3=0 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffccf9f6c8 a2=4 a3=3 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { confidentiality } for pid=4061 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:44:42.449000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffccf9f6a8 a2=94 a3=6 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { confidentiality } for pid=4061 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:44:42.449000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffccf9ee78 a2=94 a3=83 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { perfmon } for pid=4061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { confidentiality } for pid=4061 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 14 00:44:42.449000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffccf9ee78 a2=94 a3=83 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.449000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.449000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffccfa08b8 a2=10 a3=ffffccfa09a8 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.450000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.450000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffccfa0778 a2=10 a3=ffffccfa0868 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.450000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.450000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffccfa06e8 a2=10 a3=ffffccfa0868 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.450000 audit[4061]: AVC avc: denied { bpf } for pid=4061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:42.450000 audit[4061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffccfa06e8 a2=10 a3=ffffccfa0868 items=0 ppid=3781 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 14 00:44:42.458000 audit: BPF prog-id=169 op=UNLOAD May 14 00:44:42.535000 audit[4133]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=4133 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:44:42.535000 audit[4133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd49fec60 a2=0 a3=ffff89a2efa8 items=0 ppid=3781 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.535000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:44:42.538000 audit[4132]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:44:42.538000 audit[4132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffcb557800 a2=0 a3=ffff97514fa8 items=0 ppid=3781 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.538000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:44:42.545000 audit[4137]: NETFILTER_CFG table=filter:99 family=2 entries=193 op=nft_register_chain pid=4137 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:44:42.545000 audit[4137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=111640 a0=3 a1=ffffc19c0df0 a2=0 a3=ffff845abfa8 items=0 ppid=3781 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:44:42.552000 audit[4130]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4130 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:44:42.552000 audit[4130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffff0610c00 a2=0 a3=ffff997b8fa8 items=0 ppid=3781 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.552000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:44:42.575308 systemd-networkd[1048]: cali8f045d753a1: Gained IPv6LL May 14 00:44:42.614356 env[1221]: time="2025-05-14T00:44:42.614280760Z" level=info msg="StopPodSandbox for \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\"" May 14 00:44:42.639005 systemd-networkd[1048]: calic85be739274: Gained IPv6LL May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.659 [INFO][4160] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.659 [INFO][4160] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" iface="eth0" netns="/var/run/netns/cni-9e9967e1-e334-0b5c-2cc5-84b6e1955f30" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.660 [INFO][4160] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" iface="eth0" netns="/var/run/netns/cni-9e9967e1-e334-0b5c-2cc5-84b6e1955f30" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.660 [INFO][4160] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" iface="eth0" netns="/var/run/netns/cni-9e9967e1-e334-0b5c-2cc5-84b6e1955f30" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.660 [INFO][4160] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.660 [INFO][4160] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.681 [INFO][4169] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.681 [INFO][4169] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.681 [INFO][4169] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.689 [WARNING][4169] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.689 [INFO][4169] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.690 [INFO][4169] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:42.694286 env[1221]: 2025-05-14 00:44:42.692 [INFO][4160] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:44:42.695417 env[1221]: time="2025-05-14T00:44:42.695350685Z" level=info msg="TearDown network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\" successfully" May 14 00:44:42.695511 env[1221]: time="2025-05-14T00:44:42.695493739Z" level=info msg="StopPodSandbox for \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\" returns successfully" May 14 00:44:42.696081 kubelet[1957]: E0514 00:44:42.696043 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:42.697418 env[1221]: time="2025-05-14T00:44:42.697387447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-q7gw2,Uid:fdcb9a54-9cbc-4a77-a30d-0868729ac8ed,Namespace:kube-system,Attempt:1,}" May 14 00:44:42.728429 kubelet[1957]: E0514 00:44:42.727912 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:42.759745 kubelet[1957]: I0514 00:44:42.759231 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-kv768" podStartSLOduration=28.759214862 podStartE2EDuration="28.759214862s" podCreationTimestamp="2025-05-14 00:44:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:44:42.740032879 +0000 UTC m=+36.216831999" watchObservedRunningTime="2025-05-14 00:44:42.759214862 +0000 UTC m=+36.236013982" May 14 00:44:42.776000 audit[4193]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=4193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:42.776000 audit[4193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff5938370 a2=0 a3=1 items=0 ppid=2106 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.776000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:42.785000 audit[4193]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:42.785000 audit[4193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffff5938370 a2=0 a3=1 items=0 ppid=2106 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:42.797000 audit[4202]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:42.797000 audit[4202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc2869ac0 a2=0 a3=1 items=0 ppid=2106 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:42.806000 audit[4202]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:42.806000 audit[4202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc2869ac0 a2=0 a3=1 items=0 ppid=2106 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:42.853657 systemd[1]: run-netns-cni\x2d9e9967e1\x2de334\x2d0b5c\x2d2cc5\x2d84b6e1955f30.mount: Deactivated successfully. May 14 00:44:42.948162 systemd-networkd[1048]: cali9880cd597d1: Link UP May 14 00:44:42.950290 systemd-networkd[1048]: cali9880cd597d1: Gained carrier May 14 00:44:42.950945 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9880cd597d1: link becomes ready May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.772 [INFO][4177] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0 coredns-6f6b679f8f- kube-system fdcb9a54-9cbc-4a77-a30d-0868729ac8ed 909 0 2025-05-14 00:44:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-q7gw2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9880cd597d1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-q7gw2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--q7gw2-" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.772 [INFO][4177] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-q7gw2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.804 [INFO][4195] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" HandleID="k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.820 [INFO][4195] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" HandleID="k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f5f40), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-q7gw2", "timestamp":"2025-05-14 00:44:42.804252611 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.820 [INFO][4195] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.820 [INFO][4195] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.820 [INFO][4195] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.823 [INFO][4195] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.916 [INFO][4195] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.920 [INFO][4195] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.922 [INFO][4195] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.924 [INFO][4195] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.924 [INFO][4195] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.926 [INFO][4195] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6 May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.936 [INFO][4195] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.943 [INFO][4195] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.943 [INFO][4195] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" host="localhost" May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.943 [INFO][4195] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:44:42.982393 env[1221]: 2025-05-14 00:44:42.943 [INFO][4195] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" HandleID="k8s-pod-network.f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.983282 env[1221]: 2025-05-14 00:44:42.945 [INFO][4177] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-q7gw2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"fdcb9a54-9cbc-4a77-a30d-0868729ac8ed", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-q7gw2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9880cd597d1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:42.983282 env[1221]: 2025-05-14 00:44:42.945 [INFO][4177] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-q7gw2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.983282 env[1221]: 2025-05-14 00:44:42.945 [INFO][4177] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9880cd597d1 ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-q7gw2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.983282 env[1221]: 2025-05-14 00:44:42.951 [INFO][4177] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-q7gw2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.983282 env[1221]: 2025-05-14 00:44:42.955 [INFO][4177] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-q7gw2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"fdcb9a54-9cbc-4a77-a30d-0868729ac8ed", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6", Pod:"coredns-6f6b679f8f-q7gw2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9880cd597d1", MAC:"2e:b2:ee:a9:73:ad", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:44:42.983282 env[1221]: 2025-05-14 00:44:42.979 [INFO][4177] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6" Namespace="kube-system" Pod="coredns-6f6b679f8f-q7gw2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:44:42.985000 audit[4215]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4215 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 14 00:44:42.985000 audit[4215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20580 a0=3 a1=ffffe151f4d0 a2=0 a3=ffff93c5ffa8 items=0 ppid=3781 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:42.985000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 14 00:44:42.995349 env[1221]: time="2025-05-14T00:44:42.995266286Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 14 00:44:42.995349 env[1221]: time="2025-05-14T00:44:42.995323931Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 14 00:44:42.995349 env[1221]: time="2025-05-14T00:44:42.995334612Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 14 00:44:42.995531 env[1221]: time="2025-05-14T00:44:42.995477787Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6 pid=4227 runtime=io.containerd.runc.v2 May 14 00:44:43.005569 systemd[1]: Started cri-containerd-f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6.scope. May 14 00:44:43.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.049000 audit: BPF prog-id=179 op=LOAD May 14 00:44:43.050000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.050000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4227 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623333386333393430383232636138633033396139336661316533 May 14 00:44:43.050000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.050000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4227 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623333386333393430383232636138633033396139336661316533 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit: BPF prog-id=180 op=LOAD May 14 00:44:43.051000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4227 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623333386333393430383232636138633033396139336661316533 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.051000 audit: BPF prog-id=181 op=LOAD May 14 00:44:43.051000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4227 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623333386333393430383232636138633033396139336661316533 May 14 00:44:43.053000 audit: BPF prog-id=181 op=UNLOAD May 14 00:44:43.053000 audit: BPF prog-id=180 op=UNLOAD May 14 00:44:43.053000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.053000 audit: BPF prog-id=182 op=LOAD May 14 00:44:43.053000 audit[4237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4227 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637623333386333393430383232636138633033396139336661316533 May 14 00:44:43.057185 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 14 00:44:43.079199 env[1221]: time="2025-05-14T00:44:43.079156624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-q7gw2,Uid:fdcb9a54-9cbc-4a77-a30d-0868729ac8ed,Namespace:kube-system,Attempt:1,} returns sandbox id \"f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6\"" May 14 00:44:43.080029 kubelet[1957]: E0514 00:44:43.079954 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:43.085441 env[1221]: time="2025-05-14T00:44:43.084417451Z" level=info msg="CreateContainer within sandbox \"f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 14 00:44:43.098133 env[1221]: time="2025-05-14T00:44:43.098076046Z" level=info msg="CreateContainer within sandbox \"f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8b1edd9041e21bad948159084948b99c38578ece138daa44a798f592e5d39048\"" May 14 00:44:43.099732 env[1221]: time="2025-05-14T00:44:43.099276522Z" level=info msg="StartContainer for \"8b1edd9041e21bad948159084948b99c38578ece138daa44a798f592e5d39048\"" May 14 00:44:43.113669 systemd[1]: Started cri-containerd-8b1edd9041e21bad948159084948b99c38578ece138daa44a798f592e5d39048.scope. May 14 00:44:43.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit: BPF prog-id=183 op=LOAD May 14 00:44:43.137000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4227 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316564643930343165323162616439343831353930383439343862 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4227 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316564643930343165323162616439343831353930383439343862 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.137000 audit: BPF prog-id=184 op=LOAD May 14 00:44:43.137000 audit[4267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4227 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316564643930343165323162616439343831353930383439343862 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit: BPF prog-id=185 op=LOAD May 14 00:44:43.138000 audit[4267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4227 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316564643930343165323162616439343831353930383439343862 May 14 00:44:43.138000 audit: BPF prog-id=185 op=UNLOAD May 14 00:44:43.138000 audit: BPF prog-id=184 op=UNLOAD May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { perfmon } for pid=4267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit[4267]: AVC avc: denied { bpf } for pid=4267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.138000 audit: BPF prog-id=186 op=LOAD May 14 00:44:43.138000 audit[4267]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4227 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862316564643930343165323162616439343831353930383439343862 May 14 00:44:43.153170 env[1221]: time="2025-05-14T00:44:43.152224501Z" level=info msg="StartContainer for \"8b1edd9041e21bad948159084948b99c38578ece138daa44a798f592e5d39048\" returns successfully" May 14 00:44:43.315801 env[1221]: time="2025-05-14T00:44:43.315746450Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:43.317482 env[1221]: time="2025-05-14T00:44:43.317437052Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:43.320119 env[1221]: time="2025-05-14T00:44:43.320089828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:43.322037 env[1221]: time="2025-05-14T00:44:43.322004732Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:43.322564 env[1221]: time="2025-05-14T00:44:43.322521342Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 14 00:44:43.324100 env[1221]: time="2025-05-14T00:44:43.324068931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 14 00:44:43.324727 env[1221]: time="2025-05-14T00:44:43.324688271Z" level=info msg="CreateContainer within sandbox \"b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 14 00:44:43.333767 env[1221]: time="2025-05-14T00:44:43.333710340Z" level=info msg="CreateContainer within sandbox \"b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d74f5d6ae5a3f7c42f39bc427b161e9df0c29f9a1a04a8f4451bb9258fc7f49d\"" May 14 00:44:43.334228 env[1221]: time="2025-05-14T00:44:43.334198067Z" level=info msg="StartContainer for \"d74f5d6ae5a3f7c42f39bc427b161e9df0c29f9a1a04a8f4451bb9258fc7f49d\"" May 14 00:44:43.350439 systemd[1]: Started cri-containerd-d74f5d6ae5a3f7c42f39bc427b161e9df0c29f9a1a04a8f4451bb9258fc7f49d.scope. May 14 00:44:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit: BPF prog-id=187 op=LOAD May 14 00:44:43.386000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3549 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437346635643661653561336637633432663339626334323762313631 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3549 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437346635643661653561336637633432663339626334323762313631 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.386000 audit: BPF prog-id=188 op=LOAD May 14 00:44:43.386000 audit[4305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3549 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437346635643661653561336637633432663339626334323762313631 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit: BPF prog-id=189 op=LOAD May 14 00:44:43.387000 audit[4305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3549 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437346635643661653561336637633432663339626334323762313631 May 14 00:44:43.387000 audit: BPF prog-id=189 op=UNLOAD May 14 00:44:43.387000 audit: BPF prog-id=188 op=UNLOAD May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { perfmon } for pid=4305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit[4305]: AVC avc: denied { bpf } for pid=4305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:43.387000 audit: BPF prog-id=190 op=LOAD May 14 00:44:43.387000 audit[4305]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3549 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437346635643661653561336637633432663339626334323762313631 May 14 00:44:43.407005 systemd-networkd[1048]: cali6abb75dc84f: Gained IPv6LL May 14 00:44:43.407936 systemd-networkd[1048]: calid0ef59f4fac: Gained IPv6LL May 14 00:44:43.411445 env[1221]: time="2025-05-14T00:44:43.411393341Z" level=info msg="StartContainer for \"d74f5d6ae5a3f7c42f39bc427b161e9df0c29f9a1a04a8f4451bb9258fc7f49d\" returns successfully" May 14 00:44:43.727040 systemd-networkd[1048]: cali6fbb4ef1d1e: Gained IPv6LL May 14 00:44:43.737985 kubelet[1957]: E0514 00:44:43.737957 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:43.738317 kubelet[1957]: E0514 00:44:43.738008 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:43.748924 kubelet[1957]: I0514 00:44:43.748864 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-pnvfg" podStartSLOduration=21.696747395 podStartE2EDuration="23.74883712s" podCreationTimestamp="2025-05-14 00:44:20 +0000 UTC" firstStartedPulling="2025-05-14 00:44:41.271266217 +0000 UTC m=+34.748065337" lastFinishedPulling="2025-05-14 00:44:43.323355982 +0000 UTC m=+36.800155062" observedRunningTime="2025-05-14 00:44:43.748759272 +0000 UTC m=+37.225558392" watchObservedRunningTime="2025-05-14 00:44:43.74883712 +0000 UTC m=+37.225636240" May 14 00:44:43.767062 kubelet[1957]: I0514 00:44:43.767001 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-q7gw2" podStartSLOduration=29.766986467 podStartE2EDuration="29.766986467s" podCreationTimestamp="2025-05-14 00:44:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-14 00:44:43.766797009 +0000 UTC m=+37.243596129" watchObservedRunningTime="2025-05-14 00:44:43.766986467 +0000 UTC m=+37.243785547" May 14 00:44:43.810000 audit[4339]: NETFILTER_CFG table=filter:106 family=2 entries=10 op=nft_register_rule pid=4339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:43.810000 audit[4339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe886abc0 a2=0 a3=1 items=0 ppid=2106 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:43.815000 audit[4339]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=4339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:43.815000 audit[4339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe886abc0 a2=0 a3=1 items=0 ppid=2106 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:43.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:44.111001 systemd-networkd[1048]: vxlan.calico: Gained IPv6LL May 14 00:44:44.504601 env[1221]: time="2025-05-14T00:44:44.504466275Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:44.506036 env[1221]: time="2025-05-14T00:44:44.505998259Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:44.507448 env[1221]: time="2025-05-14T00:44:44.507424912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:44.508897 env[1221]: time="2025-05-14T00:44:44.508843325Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:44.509340 env[1221]: time="2025-05-14T00:44:44.509304208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 14 00:44:44.512723 env[1221]: time="2025-05-14T00:44:44.512686884Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 14 00:44:44.515178 env[1221]: time="2025-05-14T00:44:44.515146955Z" level=info msg="CreateContainer within sandbox \"b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 14 00:44:44.531000 audit[4316]: AVC avc: denied { watch } for pid=4316 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_44_28.1767082420/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c831 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c586,c831 tclass=file permissive=0 May 14 00:44:44.536204 kernel: kauditd_printk_skb: 1071 callbacks suppressed May 14 00:44:44.536406 kernel: audit: type=1400 audit(1747183484.531:1274): avc: denied { watch } for pid=4316 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_44_28.1767082420/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c831 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c586,c831 tclass=file permissive=0 May 14 00:44:44.536440 kernel: audit: type=1300 audit(1747183484.531:1274): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001012700 a2=fc6 a3=0 items=0 ppid=3549 pid=4316 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c831 key=(null) May 14 00:44:44.531000 audit[4316]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001012700 a2=fc6 a3=0 items=0 ppid=3549 pid=4316 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c831 key=(null) May 14 00:44:44.531000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:44:44.541416 kernel: audit: type=1327 audit(1747183484.531:1274): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:44:44.542828 env[1221]: time="2025-05-14T00:44:44.542783221Z" level=info msg="CreateContainer within sandbox \"b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"dc4c7287d3da5dea70480d0a4a733217f98c8150e6ec9e6a69b072adce557419\"" May 14 00:44:44.543403 env[1221]: time="2025-05-14T00:44:44.543376116Z" level=info msg="StartContainer for \"dc4c7287d3da5dea70480d0a4a733217f98c8150e6ec9e6a69b072adce557419\"" May 14 00:44:44.563975 systemd-networkd[1048]: cali9880cd597d1: Gained IPv6LL May 14 00:44:44.580140 systemd[1]: Started cri-containerd-dc4c7287d3da5dea70480d0a4a733217f98c8150e6ec9e6a69b072adce557419.scope. May 14 00:44:44.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.73:22-10.0.0.1:38524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:44.606000 systemd[1]: Started sshd@9-10.0.0.73:22-10.0.0.1:38524.service. May 14 00:44:44.610892 kernel: audit: type=1130 audit(1747183484.605:1275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.73:22-10.0.0.1:38524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:44.617000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=3601 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.622891 kernel: audit: type=1400 audit(1747183484.617:1276): avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622953 kernel: audit: type=1300 audit(1747183484.617:1276): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=3601 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463346337323837643364613564656137303438306430613461373333 May 14 00:44:44.625907 kernel: audit: type=1327 audit(1747183484.617:1276): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463346337323837643364613564656137303438306430613461373333 May 14 00:44:44.625985 kernel: audit: type=1400 audit(1747183484.617:1277): avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.629774 kernel: audit: type=1400 audit(1747183484.617:1277): avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.629829 kernel: audit: type=1400 audit(1747183484.617:1277): avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.617000 audit: BPF prog-id=191 op=LOAD May 14 00:44:44.617000 audit[4348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=3601 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463346337323837643364613564656137303438306430613461373333 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.619000 audit: BPF prog-id=192 op=LOAD May 14 00:44:44.619000 audit[4348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=3601 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463346337323837643364613564656137303438306430613461373333 May 14 00:44:44.622000 audit: BPF prog-id=192 op=UNLOAD May 14 00:44:44.622000 audit: BPF prog-id=191 op=UNLOAD May 14 00:44:44.622000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.622000 audit: BPF prog-id=193 op=LOAD May 14 00:44:44.622000 audit[4348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=3601 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463346337323837643364613564656137303438306430613461373333 May 14 00:44:44.651986 env[1221]: time="2025-05-14T00:44:44.651938234Z" level=info msg="StartContainer for \"dc4c7287d3da5dea70480d0a4a733217f98c8150e6ec9e6a69b072adce557419\" returns successfully" May 14 00:44:44.666000 audit[4366]: USER_ACCT pid=4366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.667446 sshd[4366]: Accepted publickey for core from 10.0.0.1 port 38524 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:44:44.667000 audit[4366]: CRED_ACQ pid=4366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.668000 audit[4366]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca525000 a2=3 a3=1 items=0 ppid=1 pid=4366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.668000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:44:44.669355 sshd[4366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:44:44.672836 systemd-logind[1209]: New session 10 of user core. May 14 00:44:44.673707 systemd[1]: Started session-10.scope. May 14 00:44:44.676000 audit[4366]: USER_START pid=4366 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.677000 audit[4378]: CRED_ACQ pid=4378 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.738078 env[1221]: time="2025-05-14T00:44:44.738017848Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:44.744673 env[1221]: time="2025-05-14T00:44:44.744618946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:44.746810 env[1221]: time="2025-05-14T00:44:44.746724023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:44.747943 kubelet[1957]: E0514 00:44:44.747917 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:44.748241 kubelet[1957]: E0514 00:44:44.748230 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:44.749040 env[1221]: time="2025-05-14T00:44:44.749002156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:44.750288 env[1221]: time="2025-05-14T00:44:44.749623814Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 14 00:44:44.755948 env[1221]: time="2025-05-14T00:44:44.755368792Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 14 00:44:44.758243 env[1221]: time="2025-05-14T00:44:44.757931471Z" level=info msg="CreateContainer within sandbox \"63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 14 00:44:44.771000 audit[4389]: NETFILTER_CFG table=filter:108 family=2 entries=9 op=nft_register_rule pid=4389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:44.771000 audit[4389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd4b77190 a2=0 a3=1 items=0 ppid=2106 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:44.781816 env[1221]: time="2025-05-14T00:44:44.781760141Z" level=info msg="CreateContainer within sandbox \"63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7900721c075af464d2fc4da1facdc1a6924c54fdf4a65a6ac1489defdd4a10db\"" May 14 00:44:44.783623 env[1221]: time="2025-05-14T00:44:44.783594393Z" level=info msg="StartContainer for \"7900721c075af464d2fc4da1facdc1a6924c54fdf4a65a6ac1489defdd4a10db\"" May 14 00:44:44.799000 audit[4389]: NETFILTER_CFG table=nat:109 family=2 entries=63 op=nft_register_chain pid=4389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:44.799000 audit[4389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23436 a0=3 a1=ffffd4b77190 a2=0 a3=1 items=0 ppid=2106 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:44.810009 systemd[1]: Started cri-containerd-7900721c075af464d2fc4da1facdc1a6924c54fdf4a65a6ac1489defdd4a10db.scope. May 14 00:44:44.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.847000 audit: BPF prog-id=194 op=LOAD May 14 00:44:44.848000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.848000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3859 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739303037323163303735616634363464326663346461316661636463 May 14 00:44:44.848000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.848000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3859 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739303037323163303735616634363464326663346461316661636463 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.849000 audit: BPF prog-id=195 op=LOAD May 14 00:44:44.849000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3859 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739303037323163303735616634363464326663346461316661636463 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.850000 audit: BPF prog-id=196 op=LOAD May 14 00:44:44.850000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3859 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739303037323163303735616634363464326663346461316661636463 May 14 00:44:44.850000 audit: BPF prog-id=196 op=UNLOAD May 14 00:44:44.851000 audit: BPF prog-id=195 op=UNLOAD May 14 00:44:44.851000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:44.851000 audit: BPF prog-id=197 op=LOAD May 14 00:44:44.852642 systemd[1]: run-containerd-runc-k8s.io-dc4c7287d3da5dea70480d0a4a733217f98c8150e6ec9e6a69b072adce557419-runc.34Igkw.mount: Deactivated successfully. May 14 00:44:44.851000 audit[4399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3859 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739303037323163303735616634363464326663346461316661636463 May 14 00:44:44.888872 env[1221]: time="2025-05-14T00:44:44.888038525Z" level=info msg="StartContainer for \"7900721c075af464d2fc4da1facdc1a6924c54fdf4a65a6ac1489defdd4a10db\" returns successfully" May 14 00:44:44.911639 sshd[4366]: pam_unix(sshd:session): session closed for user core May 14 00:44:44.911000 audit[4366]: USER_END pid=4366 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.911000 audit[4366]: CRED_DISP pid=4366 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.915524 systemd[1]: sshd@9-10.0.0.73:22-10.0.0.1:38524.service: Deactivated successfully. May 14 00:44:44.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.73:22-10.0.0.1:38524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:44.916142 systemd[1]: session-10.scope: Deactivated successfully. May 14 00:44:44.916723 systemd-logind[1209]: Session 10 logged out. Waiting for processes to exit. May 14 00:44:44.917840 systemd[1]: Started sshd@10-10.0.0.73:22-10.0.0.1:38536.service. May 14 00:44:44.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.73:22-10.0.0.1:38536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:44.918624 systemd-logind[1209]: Removed session 10. May 14 00:44:44.960000 audit[4428]: USER_ACCT pid=4428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.962007 sshd[4428]: Accepted publickey for core from 10.0.0.1 port 38536 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:44:44.961000 audit[4428]: CRED_ACQ pid=4428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.961000 audit[4428]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd41cee50 a2=3 a3=1 items=0 ppid=1 pid=4428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:44.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:44:44.962992 sshd[4428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:44:44.966568 systemd-logind[1209]: New session 11 of user core. May 14 00:44:44.967006 systemd[1]: Started session-11.scope. May 14 00:44:44.976000 audit[4428]: USER_START pid=4428 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:44.977000 audit[4433]: CRED_ACQ pid=4433 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.144045 sshd[4428]: pam_unix(sshd:session): session closed for user core May 14 00:44:45.147765 systemd[1]: Started sshd@11-10.0.0.73:22-10.0.0.1:38546.service. May 14 00:44:45.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.73:22-10.0.0.1:38546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:45.156000 audit[4428]: USER_END pid=4428 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.156000 audit[4428]: CRED_DISP pid=4428 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.73:22-10.0.0.1:38536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:45.164695 systemd[1]: sshd@10-10.0.0.73:22-10.0.0.1:38536.service: Deactivated successfully. May 14 00:44:45.165486 systemd[1]: session-11.scope: Deactivated successfully. May 14 00:44:45.167142 systemd-logind[1209]: Session 11 logged out. Waiting for processes to exit. May 14 00:44:45.168292 systemd-logind[1209]: Removed session 11. May 14 00:44:45.197000 audit[4444]: USER_ACCT pid=4444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.198302 sshd[4444]: Accepted publickey for core from 10.0.0.1 port 38546 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:44:45.198000 audit[4444]: CRED_ACQ pid=4444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.198000 audit[4444]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8dccfd0 a2=3 a3=1 items=0 ppid=1 pid=4444 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:45.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:44:45.199510 sshd[4444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:44:45.203531 systemd[1]: Started session-12.scope. May 14 00:44:45.203972 systemd-logind[1209]: New session 12 of user core. May 14 00:44:45.206000 audit[4444]: USER_START pid=4444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.207000 audit[4447]: CRED_ACQ pid=4447 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.359561 sshd[4444]: pam_unix(sshd:session): session closed for user core May 14 00:44:45.359000 audit[4444]: USER_END pid=4444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.359000 audit[4444]: CRED_DISP pid=4444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:45.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.73:22-10.0.0.1:38546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:45.362842 systemd[1]: sshd@11-10.0.0.73:22-10.0.0.1:38546.service: Deactivated successfully. May 14 00:44:45.363686 systemd[1]: session-12.scope: Deactivated successfully. May 14 00:44:45.364446 systemd-logind[1209]: Session 12 logged out. Waiting for processes to exit. May 14 00:44:45.365203 systemd-logind[1209]: Removed session 12. May 14 00:44:45.753223 kubelet[1957]: E0514 00:44:45.753160 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:45.764380 kubelet[1957]: I0514 00:44:45.764318 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7fd6c7cdf6-22ps2" podStartSLOduration=23.068881431 podStartE2EDuration="25.764303514s" podCreationTimestamp="2025-05-14 00:44:20 +0000 UTC" firstStartedPulling="2025-05-14 00:44:42.059013981 +0000 UTC m=+35.535813101" lastFinishedPulling="2025-05-14 00:44:44.754436064 +0000 UTC m=+38.231235184" observedRunningTime="2025-05-14 00:44:45.764107336 +0000 UTC m=+39.240906536" watchObservedRunningTime="2025-05-14 00:44:45.764303514 +0000 UTC m=+39.241102634" May 14 00:44:45.785000 audit[4458]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=4458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:45.785000 audit[4458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffc94a9d0 a2=0 a3=1 items=0 ppid=2106 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:45.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:45.800000 audit[4458]: NETFILTER_CFG table=nat:111 family=2 entries=30 op=nft_register_rule pid=4458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:44:45.800000 audit[4458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffffc94a9d0 a2=0 a3=1 items=0 ppid=2106 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:45.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:44:45.996000 audit[4410]: AVC avc: denied { watch } for pid=4410 comm="apiserver" path="/calico-apiserver-certs/..2025_05_14_00_44_28.3171577235/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c783 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c239,c783 tclass=file permissive=0 May 14 00:44:45.996000 audit[4410]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d1bd60 a2=fc6 a3=0 items=0 ppid=3859 pid=4410 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c783 key=(null) May 14 00:44:45.996000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 14 00:44:46.525210 env[1221]: time="2025-05-14T00:44:46.525143567Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:46.530019 env[1221]: time="2025-05-14T00:44:46.529948753Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:46.531671 env[1221]: time="2025-05-14T00:44:46.531638102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:46.533594 env[1221]: time="2025-05-14T00:44:46.533565193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:46.534029 env[1221]: time="2025-05-14T00:44:46.534000832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 14 00:44:46.535905 env[1221]: time="2025-05-14T00:44:46.535422638Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 14 00:44:46.544105 env[1221]: time="2025-05-14T00:44:46.544050482Z" level=info msg="CreateContainer within sandbox \"f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 14 00:44:46.555434 env[1221]: time="2025-05-14T00:44:46.555400368Z" level=info msg="CreateContainer within sandbox \"f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4be08a3e3e28b5b160bb881efb06fea3f42b777dd09eec8172e3e6079cba00c3\"" May 14 00:44:46.557062 env[1221]: time="2025-05-14T00:44:46.557016231Z" level=info msg="StartContainer for \"4be08a3e3e28b5b160bb881efb06fea3f42b777dd09eec8172e3e6079cba00c3\"" May 14 00:44:46.581571 systemd[1]: Started cri-containerd-4be08a3e3e28b5b160bb881efb06fea3f42b777dd09eec8172e3e6079cba00c3.scope. May 14 00:44:46.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit: BPF prog-id=198 op=LOAD May 14 00:44:46.616000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3941 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:46.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462653038613365336532386235623136306262383831656662303666 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3941 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:46.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462653038613365336532386235623136306262383831656662303666 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.616000 audit: BPF prog-id=199 op=LOAD May 14 00:44:46.616000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3941 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:46.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462653038613365336532386235623136306262383831656662303666 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit: BPF prog-id=200 op=LOAD May 14 00:44:46.617000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3941 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:46.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462653038613365336532386235623136306262383831656662303666 May 14 00:44:46.617000 audit: BPF prog-id=200 op=UNLOAD May 14 00:44:46.617000 audit: BPF prog-id=199 op=UNLOAD May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:46.617000 audit: BPF prog-id=201 op=LOAD May 14 00:44:46.617000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3941 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:46.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462653038613365336532386235623136306262383831656662303666 May 14 00:44:46.637907 env[1221]: time="2025-05-14T00:44:46.637832790Z" level=info msg="StartContainer for \"4be08a3e3e28b5b160bb881efb06fea3f42b777dd09eec8172e3e6079cba00c3\" returns successfully" May 14 00:44:46.756728 kubelet[1957]: I0514 00:44:46.756323 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:44:46.757196 kubelet[1957]: E0514 00:44:46.756826 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:44:46.837899 kubelet[1957]: I0514 00:44:46.837712 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-78778d7d95-szsq8" podStartSLOduration=22.471197344 podStartE2EDuration="26.837693136s" podCreationTimestamp="2025-05-14 00:44:20 +0000 UTC" firstStartedPulling="2025-05-14 00:44:42.168813596 +0000 UTC m=+35.645612676" lastFinishedPulling="2025-05-14 00:44:46.535309348 +0000 UTC m=+40.012108468" observedRunningTime="2025-05-14 00:44:46.770636555 +0000 UTC m=+40.247435675" watchObservedRunningTime="2025-05-14 00:44:46.837693136 +0000 UTC m=+40.314492216" May 14 00:44:47.941168 env[1221]: time="2025-05-14T00:44:47.941093804Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:47.942753 env[1221]: time="2025-05-14T00:44:47.942719384Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:47.944379 env[1221]: time="2025-05-14T00:44:47.944347125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:47.945987 env[1221]: time="2025-05-14T00:44:47.945962504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 14 00:44:47.946439 env[1221]: time="2025-05-14T00:44:47.946415343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 14 00:44:47.948676 env[1221]: time="2025-05-14T00:44:47.948635775Z" level=info msg="CreateContainer within sandbox \"b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 14 00:44:47.963404 env[1221]: time="2025-05-14T00:44:47.963366967Z" level=info msg="CreateContainer within sandbox \"b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ee8492ba25354d9322df3ee20747271ca936397230c935349c250fe399e55adb\"" May 14 00:44:47.963959 env[1221]: time="2025-05-14T00:44:47.963929615Z" level=info msg="StartContainer for \"ee8492ba25354d9322df3ee20747271ca936397230c935349c250fe399e55adb\"" May 14 00:44:47.986224 systemd[1]: Started cri-containerd-ee8492ba25354d9322df3ee20747271ca936397230c935349c250fe399e55adb.scope. May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3601 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565383439326261323533353464393332326466336565323037343732 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit: BPF prog-id=202 op=LOAD May 14 00:44:48.011000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3601 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565383439326261323533353464393332326466336565323037343732 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit: BPF prog-id=203 op=LOAD May 14 00:44:48.011000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3601 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565383439326261323533353464393332326466336565323037343732 May 14 00:44:48.011000 audit: BPF prog-id=203 op=UNLOAD May 14 00:44:48.011000 audit: BPF prog-id=202 op=UNLOAD May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 14 00:44:48.011000 audit: BPF prog-id=204 op=LOAD May 14 00:44:48.011000 audit[4536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3601 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565383439326261323533353464393332326466336565323037343732 May 14 00:44:48.027268 env[1221]: time="2025-05-14T00:44:48.027224464Z" level=info msg="StartContainer for \"ee8492ba25354d9322df3ee20747271ca936397230c935349c250fe399e55adb\" returns successfully" May 14 00:44:48.541205 systemd[1]: run-containerd-runc-k8s.io-ee8492ba25354d9322df3ee20747271ca936397230c935349c250fe399e55adb-runc.yx62L7.mount: Deactivated successfully. May 14 00:44:48.678788 kubelet[1957]: I0514 00:44:48.678746 1957 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 14 00:44:48.680860 kubelet[1957]: I0514 00:44:48.680832 1957 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 14 00:44:48.773285 kubelet[1957]: I0514 00:44:48.773213 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-whxp8" podStartSLOduration=22.143964955 podStartE2EDuration="28.773199527s" podCreationTimestamp="2025-05-14 00:44:20 +0000 UTC" firstStartedPulling="2025-05-14 00:44:41.318123453 +0000 UTC m=+34.794922573" lastFinishedPulling="2025-05-14 00:44:47.947358025 +0000 UTC m=+41.424157145" observedRunningTime="2025-05-14 00:44:48.772811254 +0000 UTC m=+42.249610374" watchObservedRunningTime="2025-05-14 00:44:48.773199527 +0000 UTC m=+42.249998647" May 14 00:44:50.364751 systemd[1]: Started sshd@12-10.0.0.73:22-10.0.0.1:38558.service. May 14 00:44:50.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.73:22-10.0.0.1:38558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:50.367784 kernel: kauditd_printk_skb: 241 callbacks suppressed May 14 00:44:50.367876 kernel: audit: type=1130 audit(1747183490.364:1355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.73:22-10.0.0.1:38558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:50.420000 audit[4569]: USER_ACCT pid=4569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.421885 sshd[4569]: Accepted publickey for core from 10.0.0.1 port 38558 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:44:50.424880 kernel: audit: type=1101 audit(1747183490.420:1356): pid=4569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.424000 audit[4569]: CRED_ACQ pid=4569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.428919 sshd[4569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:44:50.429239 kernel: audit: type=1103 audit(1747183490.424:1357): pid=4569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.429287 kernel: audit: type=1006 audit(1747183490.424:1358): pid=4569 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 14 00:44:50.429309 kernel: audit: type=1300 audit(1747183490.424:1358): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7f180c0 a2=3 a3=1 items=0 ppid=1 pid=4569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:50.424000 audit[4569]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7f180c0 a2=3 a3=1 items=0 ppid=1 pid=4569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:50.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:44:50.432882 kernel: audit: type=1327 audit(1747183490.424:1358): proctitle=737368643A20636F7265205B707269765D May 14 00:44:50.435229 systemd-logind[1209]: New session 13 of user core. May 14 00:44:50.436141 systemd[1]: Started session-13.scope. May 14 00:44:50.444000 audit[4569]: USER_START pid=4569 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.445000 audit[4571]: CRED_ACQ pid=4571 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.450756 kernel: audit: type=1105 audit(1747183490.444:1359): pid=4569 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.450870 kernel: audit: type=1103 audit(1747183490.445:1360): pid=4571 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.625638 sshd[4569]: pam_unix(sshd:session): session closed for user core May 14 00:44:50.625000 audit[4569]: USER_END pid=4569 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.625000 audit[4569]: CRED_DISP pid=4569 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.629039 systemd[1]: sshd@12-10.0.0.73:22-10.0.0.1:38558.service: Deactivated successfully. May 14 00:44:50.629789 systemd[1]: session-13.scope: Deactivated successfully. May 14 00:44:50.632263 kernel: audit: type=1106 audit(1747183490.625:1361): pid=4569 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.632298 kernel: audit: type=1104 audit(1747183490.625:1362): pid=4569 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:50.630367 systemd-logind[1209]: Session 13 logged out. Waiting for processes to exit. May 14 00:44:50.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.73:22-10.0.0.1:38558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:50.631145 systemd-logind[1209]: Removed session 13. May 14 00:44:55.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.73:22-10.0.0.1:60454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:55.630294 systemd[1]: Started sshd@13-10.0.0.73:22-10.0.0.1:60454.service. May 14 00:44:55.631083 kernel: kauditd_printk_skb: 1 callbacks suppressed May 14 00:44:55.631122 kernel: audit: type=1130 audit(1747183495.628:1364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.73:22-10.0.0.1:60454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:44:55.671000 audit[4591]: USER_ACCT pid=4591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.673951 sshd[4591]: Accepted publickey for core from 10.0.0.1 port 60454 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:44:55.674901 sshd[4591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:44:55.672000 audit[4591]: CRED_ACQ pid=4591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.679428 kernel: audit: type=1101 audit(1747183495.671:1365): pid=4591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.679495 kernel: audit: type=1103 audit(1747183495.672:1366): pid=4591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.679521 kernel: audit: type=1006 audit(1747183495.672:1367): pid=4591 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 14 00:44:55.678820 systemd[1]: Started session-14.scope. May 14 00:44:55.679117 systemd-logind[1209]: New session 14 of user core. May 14 00:44:55.672000 audit[4591]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd52f7430 a2=3 a3=1 items=0 ppid=1 pid=4591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:55.682198 kernel: audit: type=1300 audit(1747183495.672:1367): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd52f7430 a2=3 a3=1 items=0 ppid=1 pid=4591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:44:55.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:44:55.680000 audit[4591]: USER_START pid=4591 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.686351 kernel: audit: type=1327 audit(1747183495.672:1367): proctitle=737368643A20636F7265205B707269765D May 14 00:44:55.686394 kernel: audit: type=1105 audit(1747183495.680:1368): pid=4591 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.686413 kernel: audit: type=1103 audit(1747183495.682:1369): pid=4593 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.682000 audit[4593]: CRED_ACQ pid=4593 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.805763 sshd[4591]: pam_unix(sshd:session): session closed for user core May 14 00:44:55.804000 audit[4591]: USER_END pid=4591 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.808323 systemd[1]: session-14.scope: Deactivated successfully. May 14 00:44:55.808869 systemd[1]: sshd@13-10.0.0.73:22-10.0.0.1:60454.service: Deactivated successfully. May 14 00:44:55.804000 audit[4591]: CRED_DISP pid=4591 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.810383 systemd-logind[1209]: Session 14 logged out. Waiting for processes to exit. May 14 00:44:55.811049 systemd-logind[1209]: Removed session 14. May 14 00:44:55.811435 kernel: audit: type=1106 audit(1747183495.804:1370): pid=4591 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.811502 kernel: audit: type=1104 audit(1747183495.804:1371): pid=4591 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:44:55.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.73:22-10.0.0.1:60454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:00.810668 systemd[1]: Started sshd@14-10.0.0.73:22-10.0.0.1:60458.service. May 14 00:45:00.812168 kernel: kauditd_printk_skb: 1 callbacks suppressed May 14 00:45:00.812203 kernel: audit: type=1130 audit(1747183500.809:1373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.73:22-10.0.0.1:60458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:00.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.73:22-10.0.0.1:60458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:00.856000 audit[4626]: USER_ACCT pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.857717 sshd[4626]: Accepted publickey for core from 10.0.0.1 port 60458 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:00.859482 sshd[4626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:00.858000 audit[4626]: CRED_ACQ pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.862876 kernel: audit: type=1101 audit(1747183500.856:1374): pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.862950 kernel: audit: type=1103 audit(1747183500.858:1375): pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.862974 kernel: audit: type=1006 audit(1747183500.858:1376): pid=4626 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 14 00:45:00.863677 kernel: audit: type=1300 audit(1747183500.858:1376): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff79d3ee0 a2=3 a3=1 items=0 ppid=1 pid=4626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:00.858000 audit[4626]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff79d3ee0 a2=3 a3=1 items=0 ppid=1 pid=4626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:00.863284 systemd-logind[1209]: New session 15 of user core. May 14 00:45:00.864134 systemd[1]: Started session-15.scope. May 14 00:45:00.865900 kernel: audit: type=1327 audit(1747183500.858:1376): proctitle=737368643A20636F7265205B707269765D May 14 00:45:00.858000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:00.867000 audit[4626]: USER_START pid=4626 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.870862 kernel: audit: type=1105 audit(1747183500.867:1377): pid=4626 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.870930 kernel: audit: type=1103 audit(1747183500.868:1378): pid=4628 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.868000 audit[4628]: CRED_ACQ pid=4628 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.982584 sshd[4626]: pam_unix(sshd:session): session closed for user core May 14 00:45:00.982000 audit[4626]: USER_END pid=4626 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.985162 systemd[1]: sshd@14-10.0.0.73:22-10.0.0.1:60458.service: Deactivated successfully. May 14 00:45:00.985999 systemd[1]: session-15.scope: Deactivated successfully. May 14 00:45:00.982000 audit[4626]: CRED_DISP pid=4626 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.986553 systemd-logind[1209]: Session 15 logged out. Waiting for processes to exit. May 14 00:45:00.987216 systemd-logind[1209]: Removed session 15. May 14 00:45:00.988305 kernel: audit: type=1106 audit(1747183500.982:1379): pid=4626 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.988376 kernel: audit: type=1104 audit(1747183500.982:1380): pid=4626 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:00.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.73:22-10.0.0.1:60458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:04.316000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:04.316000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7288 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:04.316000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4008bf59a0 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:45:04.316000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:45:04.316000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400cf89110 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:45:04.316000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:45:04.316000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:04.316000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400c362d20 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:45:04.316000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:45:04.317000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:04.317000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=400c6d2c30 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:45:04.317000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:45:04.335000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:04.335000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=400c6d2d20 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:45:04.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:45:04.335000 audit[1833]: AVC avc: denied { watch } for pid=1833 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:04.335000 audit[1833]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400887ab20 a2=fc6 a3=0 items=0 ppid=1666 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c760 key=(null) May 14 00:45:04.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 14 00:45:05.223000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:05.223000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dd72e0 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:05.223000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:05.223000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:05.223000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001658390 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:05.223000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:05.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.73:22-10.0.0.1:41752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:05.987880 systemd[1]: Started sshd@15-10.0.0.73:22-10.0.0.1:41752.service. May 14 00:45:05.991499 kernel: kauditd_printk_skb: 25 callbacks suppressed May 14 00:45:05.991564 kernel: audit: type=1130 audit(1747183505.987:1390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.73:22-10.0.0.1:41752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:06.034000 audit[4648]: USER_ACCT pid=4648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.036035 sshd[4648]: Accepted publickey for core from 10.0.0.1 port 41752 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:06.038316 sshd[4648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:06.037000 audit[4648]: CRED_ACQ pid=4648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.040753 kernel: audit: type=1101 audit(1747183506.034:1391): pid=4648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.040804 kernel: audit: type=1103 audit(1747183506.037:1392): pid=4648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.044332 kernel: audit: type=1006 audit(1747183506.037:1393): pid=4648 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 14 00:45:06.044398 kernel: audit: type=1300 audit(1747183506.037:1393): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda891840 a2=3 a3=1 items=0 ppid=1 pid=4648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:06.037000 audit[4648]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda891840 a2=3 a3=1 items=0 ppid=1 pid=4648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:06.046540 systemd[1]: Started session-16.scope. May 14 00:45:06.046882 systemd-logind[1209]: New session 16 of user core. May 14 00:45:06.037000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:06.050080 kernel: audit: type=1327 audit(1747183506.037:1393): proctitle=737368643A20636F7265205B707269765D May 14 00:45:06.051000 audit[4648]: USER_START pid=4648 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.055888 kernel: audit: type=1105 audit(1747183506.051:1394): pid=4648 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.055000 audit[4650]: CRED_ACQ pid=4650 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.058900 kernel: audit: type=1103 audit(1747183506.055:1395): pid=4650 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.169713 sshd[4648]: pam_unix(sshd:session): session closed for user core May 14 00:45:06.172968 systemd[1]: Started sshd@16-10.0.0.73:22-10.0.0.1:41756.service. May 14 00:45:06.170000 audit[4648]: USER_END pid=4648 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.173805 systemd[1]: sshd@15-10.0.0.73:22-10.0.0.1:41752.service: Deactivated successfully. May 14 00:45:06.174455 systemd[1]: session-16.scope: Deactivated successfully. May 14 00:45:06.171000 audit[4648]: CRED_DISP pid=4648 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.178140 systemd-logind[1209]: Session 16 logged out. Waiting for processes to exit. May 14 00:45:06.179950 kernel: audit: type=1106 audit(1747183506.170:1396): pid=4648 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.180027 kernel: audit: type=1104 audit(1747183506.171:1397): pid=4648 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.73:22-10.0.0.1:41756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:06.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.73:22-10.0.0.1:41752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:06.180255 systemd-logind[1209]: Removed session 16. May 14 00:45:06.220000 audit[4661]: USER_ACCT pid=4661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.221065 sshd[4661]: Accepted publickey for core from 10.0.0.1 port 41756 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:06.220000 audit[4661]: CRED_ACQ pid=4661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.221000 audit[4661]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff417ad40 a2=3 a3=1 items=0 ppid=1 pid=4661 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:06.221000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:06.222203 sshd[4661]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:06.225592 systemd-logind[1209]: New session 17 of user core. May 14 00:45:06.226132 systemd[1]: Started session-17.scope. May 14 00:45:06.229000 audit[4661]: USER_START pid=4661 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.230000 audit[4664]: CRED_ACQ pid=4664 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.469833 sshd[4661]: pam_unix(sshd:session): session closed for user core May 14 00:45:06.471000 audit[4661]: USER_END pid=4661 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.471000 audit[4661]: CRED_DISP pid=4661 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.73:22-10.0.0.1:41762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:06.473296 systemd[1]: Started sshd@17-10.0.0.73:22-10.0.0.1:41762.service. May 14 00:45:06.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.73:22-10.0.0.1:41756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:06.474118 systemd[1]: sshd@16-10.0.0.73:22-10.0.0.1:41756.service: Deactivated successfully. May 14 00:45:06.474892 systemd[1]: session-17.scope: Deactivated successfully. May 14 00:45:06.475572 systemd-logind[1209]: Session 17 logged out. Waiting for processes to exit. May 14 00:45:06.476515 systemd-logind[1209]: Removed session 17. May 14 00:45:06.522000 audit[4673]: USER_ACCT pid=4673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.523190 sshd[4673]: Accepted publickey for core from 10.0.0.1 port 41762 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:06.522000 audit[4673]: CRED_ACQ pid=4673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.523000 audit[4673]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe13b61a0 a2=3 a3=1 items=0 ppid=1 pid=4673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:06.523000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:06.524168 sshd[4673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:06.528619 systemd-logind[1209]: New session 18 of user core. May 14 00:45:06.529272 systemd[1]: Started session-18.scope. May 14 00:45:06.532000 audit[4673]: USER_START pid=4673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.533000 audit[4676]: CRED_ACQ pid=4676 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:06.607214 env[1221]: time="2025-05-14T00:45:06.607170437Z" level=info msg="StopPodSandbox for \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\"" May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.649 [WARNING][4699] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0", GenerateName:"calico-apiserver-7fd6c7cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"76d26012-d4dd-4f9e-8998-4a7a2c75c980", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fd6c7cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f", Pod:"calico-apiserver-7fd6c7cdf6-pnvfg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8f045d753a1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.650 [INFO][4699] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.650 [INFO][4699] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" iface="eth0" netns="" May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.650 [INFO][4699] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.650 [INFO][4699] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.678 [INFO][4709] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.678 [INFO][4709] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.678 [INFO][4709] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.687 [WARNING][4709] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.687 [INFO][4709] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.690 [INFO][4709] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:06.694517 env[1221]: 2025-05-14 00:45:06.692 [INFO][4699] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:45:06.695112 env[1221]: time="2025-05-14T00:45:06.695076203Z" level=info msg="TearDown network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\" successfully" May 14 00:45:06.695183 env[1221]: time="2025-05-14T00:45:06.695164928Z" level=info msg="StopPodSandbox for \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\" returns successfully" May 14 00:45:06.696128 env[1221]: time="2025-05-14T00:45:06.696084346Z" level=info msg="RemovePodSandbox for \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\"" May 14 00:45:06.696197 env[1221]: time="2025-05-14T00:45:06.696129469Z" level=info msg="Forcibly stopping sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\"" May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.734 [WARNING][4732] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0", GenerateName:"calico-apiserver-7fd6c7cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"76d26012-d4dd-4f9e-8998-4a7a2c75c980", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fd6c7cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b0acb652b13dbf4b3b8fba983b8625b32f3776cbe688638e5a5e1fd4cb88a30f", Pod:"calico-apiserver-7fd6c7cdf6-pnvfg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8f045d753a1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.734 [INFO][4732] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.734 [INFO][4732] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" iface="eth0" netns="" May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.734 [INFO][4732] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.734 [INFO][4732] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.753 [INFO][4740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.753 [INFO][4740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.753 [INFO][4740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.761 [WARNING][4740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.762 [INFO][4740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" HandleID="k8s-pod-network.ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--pnvfg-eth0" May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.763 [INFO][4740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:06.767046 env[1221]: 2025-05-14 00:45:06.765 [INFO][4732] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260" May 14 00:45:06.768585 env[1221]: time="2025-05-14T00:45:06.768471343Z" level=info msg="TearDown network for sandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\" successfully" May 14 00:45:06.777247 env[1221]: time="2025-05-14T00:45:06.777210608Z" level=info msg="RemovePodSandbox \"ff429990b1ed7de9de11f5b9a5f78f07eb292adbd042490cf7c453d3566f8260\" returns successfully" May 14 00:45:06.778056 env[1221]: time="2025-05-14T00:45:06.778014178Z" level=info msg="StopPodSandbox for \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\"" May 14 00:45:06.802585 systemd[1]: run-containerd-runc-k8s.io-4be08a3e3e28b5b160bb881efb06fea3f42b777dd09eec8172e3e6079cba00c3-runc.wnSZYu.mount: Deactivated successfully. May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.841 [WARNING][4763] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0", GenerateName:"calico-kube-controllers-78778d7d95-", Namespace:"calico-system", SelfLink:"", UID:"40e9ab38-4275-4c7c-af02-c469c09d267b", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78778d7d95", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a", Pod:"calico-kube-controllers-78778d7d95-szsq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6abb75dc84f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.842 [INFO][4763] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.842 [INFO][4763] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" iface="eth0" netns="" May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.842 [INFO][4763] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.842 [INFO][4763] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.860 [INFO][4792] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.860 [INFO][4792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.860 [INFO][4792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.868 [WARNING][4792] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.868 [INFO][4792] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.870 [INFO][4792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:06.873215 env[1221]: 2025-05-14 00:45:06.871 [INFO][4763] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:45:06.873792 env[1221]: time="2025-05-14T00:45:06.873757273Z" level=info msg="TearDown network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\" successfully" May 14 00:45:06.873886 env[1221]: time="2025-05-14T00:45:06.873841718Z" level=info msg="StopPodSandbox for \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\" returns successfully" May 14 00:45:06.874395 env[1221]: time="2025-05-14T00:45:06.874363991Z" level=info msg="RemovePodSandbox for \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\"" May 14 00:45:06.874543 env[1221]: time="2025-05-14T00:45:06.874502719Z" level=info msg="Forcibly stopping sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\"" May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.907 [WARNING][4815] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0", GenerateName:"calico-kube-controllers-78778d7d95-", Namespace:"calico-system", SelfLink:"", UID:"40e9ab38-4275-4c7c-af02-c469c09d267b", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78778d7d95", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f852ae29103b09bfd4276f46ec5edc5082eb3b6f6be1083fef56c29df230e85a", Pod:"calico-kube-controllers-78778d7d95-szsq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6abb75dc84f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.908 [INFO][4815] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.908 [INFO][4815] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" iface="eth0" netns="" May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.908 [INFO][4815] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.908 [INFO][4815] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.929 [INFO][4823] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.929 [INFO][4823] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.929 [INFO][4823] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.939 [WARNING][4823] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.939 [INFO][4823] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" HandleID="k8s-pod-network.0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" Workload="localhost-k8s-calico--kube--controllers--78778d7d95--szsq8-eth0" May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.941 [INFO][4823] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:06.944368 env[1221]: 2025-05-14 00:45:06.942 [INFO][4815] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6" May 14 00:45:06.944962 env[1221]: time="2025-05-14T00:45:06.944386440Z" level=info msg="TearDown network for sandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\" successfully" May 14 00:45:06.950215 env[1221]: time="2025-05-14T00:45:06.950180282Z" level=info msg="RemovePodSandbox \"0c4079ac274101e9c418e1f2388d6af2ca89bd1e4d9e2d6d9308c5a45afa2fc6\" returns successfully" May 14 00:45:06.950760 env[1221]: time="2025-05-14T00:45:06.950714755Z" level=info msg="StopPodSandbox for \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\"" May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:06.983 [WARNING][4845] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--whxp8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"94f1513e-4d14-4aa4-9b49-2068e28e7d02", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf", Pod:"csi-node-driver-whxp8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic85be739274", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:06.983 [INFO][4845] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:06.983 [INFO][4845] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" iface="eth0" netns="" May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:06.983 [INFO][4845] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:06.983 [INFO][4845] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:07.002 [INFO][4854] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:07.002 [INFO][4854] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:07.002 [INFO][4854] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:07.010 [WARNING][4854] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:07.010 [INFO][4854] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:07.012 [INFO][4854] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:07.015750 env[1221]: 2025-05-14 00:45:07.014 [INFO][4845] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:45:07.016208 env[1221]: time="2025-05-14T00:45:07.015782406Z" level=info msg="TearDown network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\" successfully" May 14 00:45:07.016208 env[1221]: time="2025-05-14T00:45:07.015814288Z" level=info msg="StopPodSandbox for \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\" returns successfully" May 14 00:45:07.016371 env[1221]: time="2025-05-14T00:45:07.016333240Z" level=info msg="RemovePodSandbox for \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\"" May 14 00:45:07.016413 env[1221]: time="2025-05-14T00:45:07.016372123Z" level=info msg="Forcibly stopping sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\"" May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.052 [WARNING][4876] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--whxp8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"94f1513e-4d14-4aa4-9b49-2068e28e7d02", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8f1e9c6f42a35ac8ae258e233970ff27f7c877ec3e2d66538e8eb68b4a524bf", Pod:"csi-node-driver-whxp8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic85be739274", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.052 [INFO][4876] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.052 [INFO][4876] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" iface="eth0" netns="" May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.053 [INFO][4876] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.053 [INFO][4876] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.071 [INFO][4885] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.071 [INFO][4885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.071 [INFO][4885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.079 [WARNING][4885] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.079 [INFO][4885] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" HandleID="k8s-pod-network.cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" Workload="localhost-k8s-csi--node--driver--whxp8-eth0" May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.081 [INFO][4885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:07.084691 env[1221]: 2025-05-14 00:45:07.083 [INFO][4876] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795" May 14 00:45:07.085145 env[1221]: time="2025-05-14T00:45:07.084716905Z" level=info msg="TearDown network for sandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\" successfully" May 14 00:45:07.087399 env[1221]: time="2025-05-14T00:45:07.087369349Z" level=info msg="RemovePodSandbox \"cb40feac55a01b07f5932805a0bef124ca162bea7935b35a3e1575bb5ceb4795\" returns successfully" May 14 00:45:07.087879 env[1221]: time="2025-05-14T00:45:07.087839018Z" level=info msg="StopPodSandbox for \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\"" May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.137 [WARNING][4911] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"fdcb9a54-9cbc-4a77-a30d-0868729ac8ed", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6", Pod:"coredns-6f6b679f8f-q7gw2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9880cd597d1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.137 [INFO][4911] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.137 [INFO][4911] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" iface="eth0" netns="" May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.137 [INFO][4911] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.137 [INFO][4911] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.194 [INFO][4920] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.195 [INFO][4920] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.195 [INFO][4920] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.215 [WARNING][4920] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.215 [INFO][4920] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.217 [INFO][4920] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:07.222859 env[1221]: 2025-05-14 00:45:07.221 [INFO][4911] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:45:07.223381 env[1221]: time="2025-05-14T00:45:07.223347950Z" level=info msg="TearDown network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\" successfully" May 14 00:45:07.223453 env[1221]: time="2025-05-14T00:45:07.223436635Z" level=info msg="StopPodSandbox for \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\" returns successfully" May 14 00:45:07.224032 env[1221]: time="2025-05-14T00:45:07.224000630Z" level=info msg="RemovePodSandbox for \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\"" May 14 00:45:07.224103 env[1221]: time="2025-05-14T00:45:07.224036752Z" level=info msg="Forcibly stopping sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\"" May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.293 [WARNING][4945] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"fdcb9a54-9cbc-4a77-a30d-0868729ac8ed", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7b338c3940822ca8c039a93fa1e3bd805b398cc47561edd8d7ab25c4d771fb6", Pod:"coredns-6f6b679f8f-q7gw2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9880cd597d1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.294 [INFO][4945] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.294 [INFO][4945] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" iface="eth0" netns="" May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.294 [INFO][4945] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.294 [INFO][4945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.321 [INFO][4954] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.321 [INFO][4954] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.321 [INFO][4954] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.330 [WARNING][4954] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.330 [INFO][4954] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" HandleID="k8s-pod-network.ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" Workload="localhost-k8s-coredns--6f6b679f8f--q7gw2-eth0" May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.331 [INFO][4954] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:07.337620 env[1221]: 2025-05-14 00:45:07.335 [INFO][4945] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1" May 14 00:45:07.337620 env[1221]: time="2025-05-14T00:45:07.337582367Z" level=info msg="TearDown network for sandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\" successfully" May 14 00:45:07.349874 env[1221]: time="2025-05-14T00:45:07.343006342Z" level=info msg="RemovePodSandbox \"ef34ee55542908f4c890ba64f1a049fb0b8407ac2a6a2e884ec8f2b99588ddd1\" returns successfully" May 14 00:45:07.349874 env[1221]: time="2025-05-14T00:45:07.343599259Z" level=info msg="StopPodSandbox for \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\"" May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.420 [WARNING][4977] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0", GenerateName:"calico-apiserver-7fd6c7cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b452a49-73dd-4786-b4d1-3d70d68f9bf5", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fd6c7cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078", Pod:"calico-apiserver-7fd6c7cdf6-22ps2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid0ef59f4fac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.420 [INFO][4977] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.420 [INFO][4977] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" iface="eth0" netns="" May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.420 [INFO][4977] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.420 [INFO][4977] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.440 [INFO][4985] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.440 [INFO][4985] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.440 [INFO][4985] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.454 [WARNING][4985] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.454 [INFO][4985] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.455 [INFO][4985] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:07.458964 env[1221]: 2025-05-14 00:45:07.457 [INFO][4977] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:45:07.459473 env[1221]: time="2025-05-14T00:45:07.459438335Z" level=info msg="TearDown network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\" successfully" May 14 00:45:07.459555 env[1221]: time="2025-05-14T00:45:07.459539221Z" level=info msg="StopPodSandbox for \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\" returns successfully" May 14 00:45:07.460113 env[1221]: time="2025-05-14T00:45:07.460088895Z" level=info msg="RemovePodSandbox for \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\"" May 14 00:45:07.460254 env[1221]: time="2025-05-14T00:45:07.460215263Z" level=info msg="Forcibly stopping sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\"" May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.493 [WARNING][5008] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0", GenerateName:"calico-apiserver-7fd6c7cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b452a49-73dd-4786-b4d1-3d70d68f9bf5", ResourceVersion:"985", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fd6c7cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"63099b785ca86fd2b8f6bac3879cc42c3f8b9168da0ae6473bb1ad05b8eb7078", Pod:"calico-apiserver-7fd6c7cdf6-22ps2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid0ef59f4fac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.494 [INFO][5008] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.494 [INFO][5008] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" iface="eth0" netns="" May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.494 [INFO][5008] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.494 [INFO][5008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.513 [INFO][5017] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.513 [INFO][5017] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.513 [INFO][5017] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.521 [WARNING][5017] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.521 [INFO][5017] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" HandleID="k8s-pod-network.530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" Workload="localhost-k8s-calico--apiserver--7fd6c7cdf6--22ps2-eth0" May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.526 [INFO][5017] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:07.530223 env[1221]: 2025-05-14 00:45:07.528 [INFO][5008] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610" May 14 00:45:07.530773 env[1221]: time="2025-05-14T00:45:07.530737700Z" level=info msg="TearDown network for sandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\" successfully" May 14 00:45:07.533557 env[1221]: time="2025-05-14T00:45:07.533526912Z" level=info msg="RemovePodSandbox \"530ae3280205afa6c02a18aceea22ec3872d0b468f95aae5ab7423dae1a7c610\" returns successfully" May 14 00:45:07.534142 env[1221]: time="2025-05-14T00:45:07.534113629Z" level=info msg="StopPodSandbox for \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\"" May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.572 [WARNING][5039] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--kv768-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f3b7d914-57dd-4086-aa7d-60f72ce2c022", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821", Pod:"coredns-6f6b679f8f-kv768", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6fbb4ef1d1e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.573 [INFO][5039] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.573 [INFO][5039] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" iface="eth0" netns="" May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.573 [INFO][5039] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.573 [INFO][5039] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.600 [INFO][5048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.600 [INFO][5048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.601 [INFO][5048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.608 [WARNING][5048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.608 [INFO][5048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.610 [INFO][5048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:07.613082 env[1221]: 2025-05-14 00:45:07.611 [INFO][5039] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:45:07.613795 env[1221]: time="2025-05-14T00:45:07.613759669Z" level=info msg="TearDown network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\" successfully" May 14 00:45:07.613876 env[1221]: time="2025-05-14T00:45:07.613859275Z" level=info msg="StopPodSandbox for \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\" returns successfully" May 14 00:45:07.614366 env[1221]: time="2025-05-14T00:45:07.614340305Z" level=info msg="RemovePodSandbox for \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\"" May 14 00:45:07.614603 env[1221]: time="2025-05-14T00:45:07.614561519Z" level=info msg="Forcibly stopping sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\"" May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.646 [WARNING][5070] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--kv768-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f3b7d914-57dd-4086-aa7d-60f72ce2c022", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 14, 0, 44, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ae3e557bdfe937509982bb02e32a545a5eafcf2b785b2ca5c65ef11210c64821", Pod:"coredns-6f6b679f8f-kv768", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6fbb4ef1d1e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.646 [INFO][5070] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.646 [INFO][5070] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" iface="eth0" netns="" May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.646 [INFO][5070] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.646 [INFO][5070] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.664 [INFO][5079] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.664 [INFO][5079] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.664 [INFO][5079] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.672 [WARNING][5079] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.672 [INFO][5079] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" HandleID="k8s-pod-network.076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" Workload="localhost-k8s-coredns--6f6b679f8f--kv768-eth0" May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.674 [INFO][5079] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 14 00:45:07.677219 env[1221]: 2025-05-14 00:45:07.676 [INFO][5070] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843" May 14 00:45:07.677666 env[1221]: time="2025-05-14T00:45:07.677252152Z" level=info msg="TearDown network for sandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\" successfully" May 14 00:45:07.679957 env[1221]: time="2025-05-14T00:45:07.679928957Z" level=info msg="RemovePodSandbox \"076e1cd4ca6b0913ac6645452a5aae968c423c5d59785848db0fad8e0cae9843\" returns successfully" May 14 00:45:08.226000 audit[5089]: NETFILTER_CFG table=filter:112 family=2 entries=20 op=nft_register_rule pid=5089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:45:08.226000 audit[5089]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff28bd3f0 a2=0 a3=1 items=0 ppid=2106 pid=5089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:08.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:45:08.234000 audit[5089]: NETFILTER_CFG table=nat:113 family=2 entries=22 op=nft_register_rule pid=5089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:45:08.234000 audit[5089]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff28bd3f0 a2=0 a3=1 items=0 ppid=2106 pid=5089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:08.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:45:08.242920 sshd[4673]: pam_unix(sshd:session): session closed for user core May 14 00:45:08.247108 systemd[1]: Started sshd@18-10.0.0.73:22-10.0.0.1:41764.service. May 14 00:45:08.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.73:22-10.0.0.1:41764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:08.248000 audit[4673]: USER_END pid=4673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.248000 audit[4673]: CRED_DISP pid=4673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.250842 systemd[1]: sshd@17-10.0.0.73:22-10.0.0.1:41762.service: Deactivated successfully. May 14 00:45:08.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.73:22-10.0.0.1:41762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:08.251617 systemd[1]: session-18.scope: Deactivated successfully. May 14 00:45:08.252446 systemd-logind[1209]: Session 18 logged out. Waiting for processes to exit. May 14 00:45:08.253519 systemd-logind[1209]: Removed session 18. May 14 00:45:08.265000 audit[5095]: NETFILTER_CFG table=filter:114 family=2 entries=32 op=nft_register_rule pid=5095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:45:08.265000 audit[5095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffffc188210 a2=0 a3=1 items=0 ppid=2106 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:08.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:45:08.270000 audit[5095]: NETFILTER_CFG table=nat:115 family=2 entries=22 op=nft_register_rule pid=5095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:45:08.270000 audit[5095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffc188210 a2=0 a3=1 items=0 ppid=2106 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:08.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:45:08.294000 audit[5092]: USER_ACCT pid=5092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.295155 sshd[5092]: Accepted publickey for core from 10.0.0.1 port 41764 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:08.295000 audit[5092]: CRED_ACQ pid=5092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.295000 audit[5092]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe66e2320 a2=3 a3=1 items=0 ppid=1 pid=5092 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:08.295000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:08.296690 sshd[5092]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:08.300576 systemd-logind[1209]: New session 19 of user core. May 14 00:45:08.300817 systemd[1]: Started session-19.scope. May 14 00:45:08.303000 audit[5092]: USER_START pid=5092 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.304000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.575124 sshd[5092]: pam_unix(sshd:session): session closed for user core May 14 00:45:08.575000 audit[5092]: USER_END pid=5092 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.575000 audit[5092]: CRED_DISP pid=5092 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.578033 systemd[1]: sshd@18-10.0.0.73:22-10.0.0.1:41764.service: Deactivated successfully. May 14 00:45:08.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.73:22-10.0.0.1:41764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:08.578667 systemd[1]: session-19.scope: Deactivated successfully. May 14 00:45:08.579255 systemd-logind[1209]: Session 19 logged out. Waiting for processes to exit. May 14 00:45:08.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.73:22-10.0.0.1:41780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:08.580511 systemd[1]: Started sshd@19-10.0.0.73:22-10.0.0.1:41780.service. May 14 00:45:08.582086 systemd-logind[1209]: Removed session 19. May 14 00:45:08.624000 audit[5105]: USER_ACCT pid=5105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.625920 sshd[5105]: Accepted publickey for core from 10.0.0.1 port 41780 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:08.626000 audit[5105]: CRED_ACQ pid=5105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.626000 audit[5105]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe39531c0 a2=3 a3=1 items=0 ppid=1 pid=5105 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:08.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:08.627480 sshd[5105]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:08.631920 systemd-logind[1209]: New session 20 of user core. May 14 00:45:08.632278 systemd[1]: Started session-20.scope. May 14 00:45:08.634000 audit[5105]: USER_START pid=5105 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.635000 audit[5107]: CRED_ACQ pid=5107 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.745921 sshd[5105]: pam_unix(sshd:session): session closed for user core May 14 00:45:08.746000 audit[5105]: USER_END pid=5105 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.746000 audit[5105]: CRED_DISP pid=5105 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:08.748285 systemd[1]: session-20.scope: Deactivated successfully. May 14 00:45:08.748841 systemd[1]: sshd@19-10.0.0.73:22-10.0.0.1:41780.service: Deactivated successfully. May 14 00:45:08.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.73:22-10.0.0.1:41780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:08.749730 systemd-logind[1209]: Session 20 logged out. Waiting for processes to exit. May 14 00:45:08.750322 systemd-logind[1209]: Removed session 20. May 14 00:45:08.842040 systemd[1]: run-containerd-runc-k8s.io-7dc5816bfed77a6380118bcffa3d982bd25239c34b388289fea1bf5b62c7f415-runc.IGojaG.mount: Deactivated successfully. May 14 00:45:08.897012 kubelet[1957]: E0514 00:45:08.896980 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:45:10.532810 kubelet[1957]: I0514 00:45:10.532764 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 14 00:45:10.562000 audit[5140]: NETFILTER_CFG table=filter:116 family=2 entries=32 op=nft_register_rule pid=5140 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:45:10.562000 audit[5140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff3fe44e0 a2=0 a3=1 items=0 ppid=2106 pid=5140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:10.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:45:10.571000 audit[5140]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=5140 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:45:10.571000 audit[5140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff3fe44e0 a2=0 a3=1 items=0 ppid=2106 pid=5140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:10.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:45:11.498000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:11.500999 kernel: kauditd_printk_skb: 63 callbacks suppressed May 14 00:45:11.501066 kernel: audit: type=1400 audit(1747183511.498:1442): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:11.498000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:11.505469 kernel: audit: type=1400 audit(1747183511.498:1441): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:11.505524 kernel: audit: type=1300 audit(1747183511.498:1441): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002d40200 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:11.498000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002d40200 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:11.508389 kernel: audit: type=1327 audit(1747183511.498:1441): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:11.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:11.510828 kernel: audit: type=1400 audit(1747183511.498:1443): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:11.498000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:11.498000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002d40220 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:11.516028 kernel: audit: type=1300 audit(1747183511.498:1443): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002d40220 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:11.516082 kernel: audit: type=1327 audit(1747183511.498:1443): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:11.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:11.518357 kernel: audit: type=1400 audit(1747183511.498:1444): avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:11.498000 audit[1831]: AVC avc: denied { watch } for pid=1831 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 14 00:45:11.498000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002b944e0 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:11.523195 kernel: audit: type=1300 audit(1747183511.498:1444): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002b944e0 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:11.523238 kernel: audit: type=1327 audit(1747183511.498:1444): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:11.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:11.498000 audit[1831]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a3d440 a2=fc6 a3=0 items=0 ppid=1667 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c20,c422 key=(null) May 14 00:45:11.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 14 00:45:13.610000 audit[5144]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:45:13.610000 audit[5144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe58d5280 a2=0 a3=1 items=0 ppid=2106 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:13.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:45:13.621000 audit[5144]: NETFILTER_CFG table=nat:119 family=2 entries=106 op=nft_register_chain pid=5144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 14 00:45:13.621000 audit[5144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe58d5280 a2=0 a3=1 items=0 ppid=2106 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:13.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 14 00:45:13.750941 systemd[1]: Started sshd@20-10.0.0.73:22-10.0.0.1:49724.service. May 14 00:45:13.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.73:22-10.0.0.1:49724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:13.794000 audit[5147]: USER_ACCT pid=5147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:13.795251 sshd[5147]: Accepted publickey for core from 10.0.0.1 port 49724 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:13.795000 audit[5147]: CRED_ACQ pid=5147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:13.795000 audit[5147]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec4756f0 a2=3 a3=1 items=0 ppid=1 pid=5147 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:13.795000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:13.797107 sshd[5147]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:13.801961 systemd-logind[1209]: New session 21 of user core. May 14 00:45:13.802417 systemd[1]: Started session-21.scope. May 14 00:45:13.806000 audit[5147]: USER_START pid=5147 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:13.807000 audit[5149]: CRED_ACQ pid=5149 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:13.943063 sshd[5147]: pam_unix(sshd:session): session closed for user core May 14 00:45:13.943000 audit[5147]: USER_END pid=5147 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:13.943000 audit[5147]: CRED_DISP pid=5147 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:13.945970 systemd[1]: sshd@20-10.0.0.73:22-10.0.0.1:49724.service: Deactivated successfully. May 14 00:45:13.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.73:22-10.0.0.1:49724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:13.946728 systemd[1]: session-21.scope: Deactivated successfully. May 14 00:45:13.947217 systemd-logind[1209]: Session 21 logged out. Waiting for processes to exit. May 14 00:45:13.948272 systemd-logind[1209]: Removed session 21. May 14 00:45:18.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.73:22-10.0.0.1:49732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:18.945495 systemd[1]: Started sshd@21-10.0.0.73:22-10.0.0.1:49732.service. May 14 00:45:18.946181 kernel: kauditd_printk_skb: 19 callbacks suppressed May 14 00:45:18.946218 kernel: audit: type=1130 audit(1747183518.944:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.73:22-10.0.0.1:49732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:18.988000 audit[5164]: USER_ACCT pid=5164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:18.989448 sshd[5164]: Accepted publickey for core from 10.0.0.1 port 49732 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:18.990964 sshd[5164]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:18.989000 audit[5164]: CRED_ACQ pid=5164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:18.993825 kernel: audit: type=1101 audit(1747183518.988:1457): pid=5164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:18.993879 kernel: audit: type=1103 audit(1747183518.989:1458): pid=5164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:18.993898 kernel: audit: type=1006 audit(1747183518.989:1459): pid=5164 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 14 00:45:18.994969 systemd[1]: Started session-22.scope. May 14 00:45:18.995160 kernel: audit: type=1300 audit(1747183518.989:1459): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebb06c80 a2=3 a3=1 items=0 ppid=1 pid=5164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:18.989000 audit[5164]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebb06c80 a2=3 a3=1 items=0 ppid=1 pid=5164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:18.995402 systemd-logind[1209]: New session 22 of user core. May 14 00:45:18.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:18.998104 kernel: audit: type=1327 audit(1747183518.989:1459): proctitle=737368643A20636F7265205B707269765D May 14 00:45:18.998000 audit[5164]: USER_START pid=5164 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:19.000000 audit[5166]: CRED_ACQ pid=5166 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:19.004437 kernel: audit: type=1105 audit(1747183518.998:1460): pid=5164 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:19.004490 kernel: audit: type=1103 audit(1747183519.000:1461): pid=5166 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:19.110138 sshd[5164]: pam_unix(sshd:session): session closed for user core May 14 00:45:19.110000 audit[5164]: USER_END pid=5164 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:19.112642 systemd[1]: sshd@21-10.0.0.73:22-10.0.0.1:49732.service: Deactivated successfully. May 14 00:45:19.113405 systemd[1]: session-22.scope: Deactivated successfully. May 14 00:45:19.110000 audit[5164]: CRED_DISP pid=5164 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:19.114228 systemd-logind[1209]: Session 22 logged out. Waiting for processes to exit. May 14 00:45:19.115028 systemd-logind[1209]: Removed session 22. May 14 00:45:19.116054 kernel: audit: type=1106 audit(1747183519.110:1462): pid=5164 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:19.116140 kernel: audit: type=1104 audit(1747183519.110:1463): pid=5164 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:19.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.73:22-10.0.0.1:49732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:19.614373 kubelet[1957]: E0514 00:45:19.614339 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 14 00:45:24.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.73:22-10.0.0.1:53096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:24.114632 systemd[1]: Started sshd@22-10.0.0.73:22-10.0.0.1:53096.service. May 14 00:45:24.115309 kernel: kauditd_printk_skb: 1 callbacks suppressed May 14 00:45:24.115353 kernel: audit: type=1130 audit(1747183524.112:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.73:22-10.0.0.1:53096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:24.169808 sshd[5185]: Accepted publickey for core from 10.0.0.1 port 53096 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:24.167000 audit[5185]: USER_ACCT pid=5185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.172823 sshd[5185]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:24.173066 kernel: audit: type=1101 audit(1747183524.167:1466): pid=5185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.173098 kernel: audit: type=1103 audit(1747183524.171:1467): pid=5185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.171000 audit[5185]: CRED_ACQ pid=5185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.176699 kernel: audit: type=1006 audit(1747183524.171:1468): pid=5185 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 14 00:45:24.176753 kernel: audit: type=1300 audit(1747183524.171:1468): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd67924b0 a2=3 a3=1 items=0 ppid=1 pid=5185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:24.171000 audit[5185]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd67924b0 a2=3 a3=1 items=0 ppid=1 pid=5185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:24.171000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:24.179898 kernel: audit: type=1327 audit(1747183524.171:1468): proctitle=737368643A20636F7265205B707269765D May 14 00:45:24.180705 systemd-logind[1209]: New session 23 of user core. May 14 00:45:24.181162 systemd[1]: Started session-23.scope. May 14 00:45:24.182000 audit[5185]: USER_START pid=5185 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.186000 audit[5187]: CRED_ACQ pid=5187 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.189926 kernel: audit: type=1105 audit(1747183524.182:1469): pid=5185 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.189971 kernel: audit: type=1103 audit(1747183524.186:1470): pid=5187 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.372929 sshd[5185]: pam_unix(sshd:session): session closed for user core May 14 00:45:24.372000 audit[5185]: USER_END pid=5185 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.372000 audit[5185]: CRED_DISP pid=5185 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.377708 systemd[1]: sshd@22-10.0.0.73:22-10.0.0.1:53096.service: Deactivated successfully. May 14 00:45:24.378514 systemd[1]: session-23.scope: Deactivated successfully. May 14 00:45:24.379054 systemd-logind[1209]: Session 23 logged out. Waiting for processes to exit. May 14 00:45:24.379519 kernel: audit: type=1106 audit(1747183524.372:1471): pid=5185 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.379555 kernel: audit: type=1104 audit(1747183524.372:1472): pid=5185 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:24.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.73:22-10.0.0.1:53096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:24.379736 systemd-logind[1209]: Removed session 23. May 14 00:45:29.377910 kernel: kauditd_printk_skb: 1 callbacks suppressed May 14 00:45:29.378026 kernel: audit: type=1130 audit(1747183529.376:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.73:22-10.0.0.1:53110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:29.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.73:22-10.0.0.1:53110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:29.377247 systemd[1]: Started sshd@23-10.0.0.73:22-10.0.0.1:53110.service. May 14 00:45:29.426000 audit[5198]: USER_ACCT pid=5198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.427582 sshd[5198]: Accepted publickey for core from 10.0.0.1 port 53110 ssh2: RSA SHA256:Ft5GW8W8jN9tGS/uukCO+uGXWTzIC0GL6a4nCPNTNlk May 14 00:45:29.429142 sshd[5198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 14 00:45:29.427000 audit[5198]: CRED_ACQ pid=5198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.433058 kernel: audit: type=1101 audit(1747183529.426:1475): pid=5198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.433133 kernel: audit: type=1103 audit(1747183529.427:1476): pid=5198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.433155 kernel: audit: type=1006 audit(1747183529.427:1477): pid=5198 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 14 00:45:29.434565 kernel: audit: type=1300 audit(1747183529.427:1477): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb0fbe60 a2=3 a3=1 items=0 ppid=1 pid=5198 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:29.427000 audit[5198]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb0fbe60 a2=3 a3=1 items=0 ppid=1 pid=5198 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 14 00:45:29.434115 systemd-logind[1209]: New session 24 of user core. May 14 00:45:29.434286 systemd[1]: Started session-24.scope. May 14 00:45:29.427000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 14 00:45:29.438073 kernel: audit: type=1327 audit(1747183529.427:1477): proctitle=737368643A20636F7265205B707269765D May 14 00:45:29.437000 audit[5198]: USER_START pid=5198 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.441577 kernel: audit: type=1105 audit(1747183529.437:1478): pid=5198 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.441676 kernel: audit: type=1103 audit(1747183529.439:1479): pid=5200 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.439000 audit[5200]: CRED_ACQ pid=5200 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.549143 sshd[5198]: pam_unix(sshd:session): session closed for user core May 14 00:45:29.549000 audit[5198]: USER_END pid=5198 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.551639 systemd[1]: sshd@23-10.0.0.73:22-10.0.0.1:53110.service: Deactivated successfully. May 14 00:45:29.552457 systemd[1]: session-24.scope: Deactivated successfully. May 14 00:45:29.553113 systemd-logind[1209]: Session 24 logged out. Waiting for processes to exit. May 14 00:45:29.549000 audit[5198]: CRED_DISP pid=5198 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.553757 systemd-logind[1209]: Removed session 24. May 14 00:45:29.555181 kernel: audit: type=1106 audit(1747183529.549:1480): pid=5198 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.555246 kernel: audit: type=1104 audit(1747183529.549:1481): pid=5198 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 14 00:45:29.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.73:22-10.0.0.1:53110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 14 00:45:29.614416 kubelet[1957]: E0514 00:45:29.614372 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"