May 15 10:18:29.755330 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 15 10:18:29.755352 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu May 15 09:09:56 -00 2025 May 15 10:18:29.755360 kernel: efi: EFI v2.70 by EDK II May 15 10:18:29.755366 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 15 10:18:29.755371 kernel: random: crng init done May 15 10:18:29.755377 kernel: ACPI: Early table checksum verification disabled May 15 10:18:29.755383 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 15 10:18:29.755390 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 15 10:18:29.755396 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755402 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755407 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755413 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755418 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755424 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755431 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755437 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755443 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:18:29.755449 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 15 10:18:29.755455 kernel: NUMA: Failed to initialise from firmware May 15 10:18:29.755460 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:18:29.755466 kernel: NUMA: NODE_DATA [mem 0xdcb09900-0xdcb0efff] May 15 10:18:29.755472 kernel: Zone ranges: May 15 10:18:29.755478 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:18:29.755485 kernel: DMA32 empty May 15 10:18:29.755491 kernel: Normal empty May 15 10:18:29.755496 kernel: Movable zone start for each node May 15 10:18:29.755502 kernel: Early memory node ranges May 15 10:18:29.755508 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 15 10:18:29.755514 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 15 10:18:29.755519 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 15 10:18:29.755525 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 15 10:18:29.755531 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 15 10:18:29.755536 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 15 10:18:29.755542 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 15 10:18:29.755548 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:18:29.755555 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 15 10:18:29.755561 kernel: psci: probing for conduit method from ACPI. May 15 10:18:29.755566 kernel: psci: PSCIv1.1 detected in firmware. May 15 10:18:29.755572 kernel: psci: Using standard PSCI v0.2 function IDs May 15 10:18:29.755578 kernel: psci: Trusted OS migration not required May 15 10:18:29.755586 kernel: psci: SMC Calling Convention v1.1 May 15 10:18:29.755593 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 15 10:18:29.755600 kernel: ACPI: SRAT not present May 15 10:18:29.755606 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 15 10:18:29.755613 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 15 10:18:29.755619 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 15 10:18:29.755625 kernel: Detected PIPT I-cache on CPU0 May 15 10:18:29.755631 kernel: CPU features: detected: GIC system register CPU interface May 15 10:18:29.755637 kernel: CPU features: detected: Hardware dirty bit management May 15 10:18:29.755643 kernel: CPU features: detected: Spectre-v4 May 15 10:18:29.755649 kernel: CPU features: detected: Spectre-BHB May 15 10:18:29.755657 kernel: CPU features: kernel page table isolation forced ON by KASLR May 15 10:18:29.755663 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 15 10:18:29.755669 kernel: CPU features: detected: ARM erratum 1418040 May 15 10:18:29.755676 kernel: CPU features: detected: SSBS not fully self-synchronizing May 15 10:18:29.755682 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 15 10:18:29.755688 kernel: Policy zone: DMA May 15 10:18:29.755695 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:18:29.755702 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:18:29.755708 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:18:29.755714 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:18:29.755720 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:18:29.755728 kernel: Memory: 2457396K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114892K reserved, 0K cma-reserved) May 15 10:18:29.755735 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:18:29.755741 kernel: trace event string verifier disabled May 15 10:18:29.755747 kernel: rcu: Preemptible hierarchical RCU implementation. May 15 10:18:29.755754 kernel: rcu: RCU event tracing is enabled. May 15 10:18:29.755760 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:18:29.755767 kernel: Trampoline variant of Tasks RCU enabled. May 15 10:18:29.755773 kernel: Tracing variant of Tasks RCU enabled. May 15 10:18:29.755779 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:18:29.755785 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:18:29.757836 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 15 10:18:29.757854 kernel: GICv3: 256 SPIs implemented May 15 10:18:29.757860 kernel: GICv3: 0 Extended SPIs implemented May 15 10:18:29.757866 kernel: GICv3: Distributor has no Range Selector support May 15 10:18:29.757872 kernel: Root IRQ handler: gic_handle_irq May 15 10:18:29.757879 kernel: GICv3: 16 PPIs implemented May 15 10:18:29.757885 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 15 10:18:29.757891 kernel: ACPI: SRAT not present May 15 10:18:29.757898 kernel: ITS [mem 0x08080000-0x0809ffff] May 15 10:18:29.757904 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 15 10:18:29.757910 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 15 10:18:29.757917 kernel: GICv3: using LPI property table @0x00000000400d0000 May 15 10:18:29.757923 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 15 10:18:29.757936 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:18:29.757943 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 15 10:18:29.757949 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 15 10:18:29.757955 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 15 10:18:29.757962 kernel: arm-pv: using stolen time PV May 15 10:18:29.757974 kernel: Console: colour dummy device 80x25 May 15 10:18:29.757983 kernel: ACPI: Core revision 20210730 May 15 10:18:29.757989 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 15 10:18:29.757996 kernel: pid_max: default: 32768 minimum: 301 May 15 10:18:29.758003 kernel: LSM: Security Framework initializing May 15 10:18:29.758011 kernel: SELinux: Initializing. May 15 10:18:29.758018 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:18:29.758024 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:18:29.758031 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 15 10:18:29.758037 kernel: rcu: Hierarchical SRCU implementation. May 15 10:18:29.758044 kernel: Platform MSI: ITS@0x8080000 domain created May 15 10:18:29.758050 kernel: PCI/MSI: ITS@0x8080000 domain created May 15 10:18:29.758056 kernel: Remapping and enabling EFI services. May 15 10:18:29.758063 kernel: smp: Bringing up secondary CPUs ... May 15 10:18:29.758070 kernel: Detected PIPT I-cache on CPU1 May 15 10:18:29.758077 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 15 10:18:29.758084 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 15 10:18:29.758090 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:18:29.758097 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 15 10:18:29.758104 kernel: Detected PIPT I-cache on CPU2 May 15 10:18:29.758110 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 15 10:18:29.758117 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 15 10:18:29.758123 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:18:29.758130 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 15 10:18:29.758137 kernel: Detected PIPT I-cache on CPU3 May 15 10:18:29.758144 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 15 10:18:29.758150 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 15 10:18:29.758157 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:18:29.758169 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 15 10:18:29.758176 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:18:29.758183 kernel: SMP: Total of 4 processors activated. May 15 10:18:29.758190 kernel: CPU features: detected: 32-bit EL0 Support May 15 10:18:29.758197 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 15 10:18:29.758203 kernel: CPU features: detected: Common not Private translations May 15 10:18:29.758210 kernel: CPU features: detected: CRC32 instructions May 15 10:18:29.758217 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 15 10:18:29.758225 kernel: CPU features: detected: LSE atomic instructions May 15 10:18:29.758232 kernel: CPU features: detected: Privileged Access Never May 15 10:18:29.758239 kernel: CPU features: detected: RAS Extension Support May 15 10:18:29.758246 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 15 10:18:29.758253 kernel: CPU: All CPU(s) started at EL1 May 15 10:18:29.758261 kernel: alternatives: patching kernel code May 15 10:18:29.758267 kernel: devtmpfs: initialized May 15 10:18:29.758274 kernel: KASLR enabled May 15 10:18:29.758281 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:18:29.758288 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:18:29.758295 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:18:29.758301 kernel: SMBIOS 3.0.0 present. May 15 10:18:29.758308 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 15 10:18:29.758315 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:18:29.758323 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 15 10:18:29.758330 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 15 10:18:29.758337 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 15 10:18:29.758344 kernel: audit: initializing netlink subsys (disabled) May 15 10:18:29.758351 kernel: audit: type=2000 audit(0.034:1): state=initialized audit_enabled=0 res=1 May 15 10:18:29.758357 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:18:29.758364 kernel: cpuidle: using governor menu May 15 10:18:29.758371 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 15 10:18:29.758378 kernel: ASID allocator initialised with 32768 entries May 15 10:18:29.758386 kernel: ACPI: bus type PCI registered May 15 10:18:29.758393 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:18:29.758400 kernel: Serial: AMBA PL011 UART driver May 15 10:18:29.758406 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:18:29.758413 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 15 10:18:29.758420 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:18:29.758427 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 15 10:18:29.758434 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:18:29.758441 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 15 10:18:29.758449 kernel: ACPI: Added _OSI(Module Device) May 15 10:18:29.758455 kernel: ACPI: Added _OSI(Processor Device) May 15 10:18:29.758462 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:18:29.758469 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:18:29.758476 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:18:29.758482 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:18:29.758489 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:18:29.758496 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:18:29.758503 kernel: ACPI: Interpreter enabled May 15 10:18:29.758510 kernel: ACPI: Using GIC for interrupt routing May 15 10:18:29.758517 kernel: ACPI: MCFG table detected, 1 entries May 15 10:18:29.758524 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 15 10:18:29.758531 kernel: printk: console [ttyAMA0] enabled May 15 10:18:29.758538 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:18:29.758694 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:18:29.758762 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 15 10:18:29.758824 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 15 10:18:29.758882 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 15 10:18:29.758953 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 15 10:18:29.758963 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 15 10:18:29.758993 kernel: PCI host bridge to bus 0000:00 May 15 10:18:29.759073 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 15 10:18:29.759129 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 15 10:18:29.759191 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 15 10:18:29.759250 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:18:29.759328 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 15 10:18:29.759404 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:18:29.759469 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 15 10:18:29.759532 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 15 10:18:29.759594 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:18:29.759657 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:18:29.759719 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 15 10:18:29.759784 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 15 10:18:29.759840 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 15 10:18:29.759896 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 15 10:18:29.759965 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 15 10:18:29.760004 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 15 10:18:29.760013 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 15 10:18:29.760023 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 15 10:18:29.760030 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 15 10:18:29.760037 kernel: iommu: Default domain type: Translated May 15 10:18:29.760044 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 15 10:18:29.760051 kernel: vgaarb: loaded May 15 10:18:29.760058 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:18:29.760065 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:18:29.760072 kernel: PTP clock support registered May 15 10:18:29.760079 kernel: Registered efivars operations May 15 10:18:29.760087 kernel: clocksource: Switched to clocksource arch_sys_counter May 15 10:18:29.760094 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:18:29.760102 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:18:29.760109 kernel: pnp: PnP ACPI init May 15 10:18:29.760196 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 15 10:18:29.760207 kernel: pnp: PnP ACPI: found 1 devices May 15 10:18:29.760214 kernel: NET: Registered PF_INET protocol family May 15 10:18:29.760221 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:18:29.760230 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:18:29.760238 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:18:29.760245 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:18:29.760252 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:18:29.760259 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:18:29.760266 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:18:29.760273 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:18:29.760280 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:18:29.760287 kernel: PCI: CLS 0 bytes, default 64 May 15 10:18:29.760295 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 15 10:18:29.760302 kernel: kvm [1]: HYP mode not available May 15 10:18:29.760309 kernel: Initialise system trusted keyrings May 15 10:18:29.760316 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:18:29.760323 kernel: Key type asymmetric registered May 15 10:18:29.760330 kernel: Asymmetric key parser 'x509' registered May 15 10:18:29.760337 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:18:29.760343 kernel: io scheduler mq-deadline registered May 15 10:18:29.760351 kernel: io scheduler kyber registered May 15 10:18:29.760359 kernel: io scheduler bfq registered May 15 10:18:29.760366 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 15 10:18:29.760373 kernel: ACPI: button: Power Button [PWRB] May 15 10:18:29.760380 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 15 10:18:29.760445 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 15 10:18:29.760455 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:18:29.760462 kernel: thunder_xcv, ver 1.0 May 15 10:18:29.760468 kernel: thunder_bgx, ver 1.0 May 15 10:18:29.760475 kernel: nicpf, ver 1.0 May 15 10:18:29.760484 kernel: nicvf, ver 1.0 May 15 10:18:29.760555 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 15 10:18:29.760614 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-15T10:18:29 UTC (1747304309) May 15 10:18:29.760623 kernel: hid: raw HID events driver (C) Jiri Kosina May 15 10:18:29.760629 kernel: NET: Registered PF_INET6 protocol family May 15 10:18:29.760636 kernel: Segment Routing with IPv6 May 15 10:18:29.760643 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:18:29.760650 kernel: NET: Registered PF_PACKET protocol family May 15 10:18:29.760658 kernel: Key type dns_resolver registered May 15 10:18:29.760665 kernel: registered taskstats version 1 May 15 10:18:29.760673 kernel: Loading compiled-in X.509 certificates May 15 10:18:29.760680 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 3679cbfb4d4756a2ddc177f0eaedea33fb5fdf2e' May 15 10:18:29.760687 kernel: Key type .fscrypt registered May 15 10:18:29.760693 kernel: Key type fscrypt-provisioning registered May 15 10:18:29.760700 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:18:29.760707 kernel: ima: Allocated hash algorithm: sha1 May 15 10:18:29.760714 kernel: ima: No architecture policies found May 15 10:18:29.760722 kernel: clk: Disabling unused clocks May 15 10:18:29.760729 kernel: Freeing unused kernel memory: 36416K May 15 10:18:29.760736 kernel: Run /init as init process May 15 10:18:29.760743 kernel: with arguments: May 15 10:18:29.760749 kernel: /init May 15 10:18:29.760756 kernel: with environment: May 15 10:18:29.760763 kernel: HOME=/ May 15 10:18:29.760769 kernel: TERM=linux May 15 10:18:29.760776 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:18:29.760786 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:18:29.760796 systemd[1]: Detected virtualization kvm. May 15 10:18:29.760804 systemd[1]: Detected architecture arm64. May 15 10:18:29.760811 systemd[1]: Running in initrd. May 15 10:18:29.760818 systemd[1]: No hostname configured, using default hostname. May 15 10:18:29.760826 systemd[1]: Hostname set to . May 15 10:18:29.760833 systemd[1]: Initializing machine ID from VM UUID. May 15 10:18:29.760842 systemd[1]: Queued start job for default target initrd.target. May 15 10:18:29.760849 systemd[1]: Started systemd-ask-password-console.path. May 15 10:18:29.760856 systemd[1]: Reached target cryptsetup.target. May 15 10:18:29.760864 systemd[1]: Reached target paths.target. May 15 10:18:29.760871 systemd[1]: Reached target slices.target. May 15 10:18:29.760878 systemd[1]: Reached target swap.target. May 15 10:18:29.760885 systemd[1]: Reached target timers.target. May 15 10:18:29.760893 systemd[1]: Listening on iscsid.socket. May 15 10:18:29.760902 systemd[1]: Listening on iscsiuio.socket. May 15 10:18:29.760909 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:18:29.760917 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:18:29.760924 systemd[1]: Listening on systemd-journald.socket. May 15 10:18:29.760939 systemd[1]: Listening on systemd-networkd.socket. May 15 10:18:29.760947 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:18:29.760955 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:18:29.760962 systemd[1]: Reached target sockets.target. May 15 10:18:29.761016 systemd[1]: Starting kmod-static-nodes.service... May 15 10:18:29.761024 systemd[1]: Finished network-cleanup.service. May 15 10:18:29.761031 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:18:29.761039 systemd[1]: Starting systemd-journald.service... May 15 10:18:29.761046 systemd[1]: Starting systemd-modules-load.service... May 15 10:18:29.761053 systemd[1]: Starting systemd-resolved.service... May 15 10:18:29.761061 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:18:29.761068 systemd[1]: Finished kmod-static-nodes.service. May 15 10:18:29.761075 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:18:29.761084 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:18:29.761092 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:18:29.761100 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:18:29.761107 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:18:29.761115 kernel: audit: type=1130 audit(1747304309.753:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.761128 systemd-journald[290]: Journal started May 15 10:18:29.761177 systemd-journald[290]: Runtime Journal (/run/log/journal/e8ae413e21ff457a8ed3f0cc39a56b54) is 6.0M, max 48.7M, 42.6M free. May 15 10:18:29.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.742502 systemd-modules-load[291]: Inserted module 'overlay' May 15 10:18:29.763718 systemd[1]: Started systemd-journald.service. May 15 10:18:29.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.765995 kernel: audit: type=1130 audit(1747304309.762:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.766365 systemd-resolved[292]: Positive Trust Anchors: May 15 10:18:29.768297 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:18:29.766379 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:18:29.766407 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:18:29.773299 systemd-resolved[292]: Defaulting to hostname 'linux'. May 15 10:18:29.774920 systemd[1]: Started systemd-resolved.service. May 15 10:18:29.780463 kernel: audit: type=1130 audit(1747304309.775:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.780486 kernel: Bridge firewalling registered May 15 10:18:29.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.776915 systemd[1]: Reached target nss-lookup.target. May 15 10:18:29.779796 systemd-modules-load[291]: Inserted module 'br_netfilter' May 15 10:18:29.784340 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:18:29.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.787612 systemd[1]: Starting dracut-cmdline.service... May 15 10:18:29.788825 kernel: audit: type=1130 audit(1747304309.784:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.791991 kernel: SCSI subsystem initialized May 15 10:18:29.798058 dracut-cmdline[308]: dracut-dracut-053 May 15 10:18:29.800278 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:18:29.800298 kernel: device-mapper: uevent: version 1.0.3 May 15 10:18:29.800308 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:18:29.800676 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:18:29.804777 systemd-modules-load[291]: Inserted module 'dm_multipath' May 15 10:18:29.805600 systemd[1]: Finished systemd-modules-load.service. May 15 10:18:29.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.808746 systemd[1]: Starting systemd-sysctl.service... May 15 10:18:29.810999 kernel: audit: type=1130 audit(1747304309.806:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.817851 systemd[1]: Finished systemd-sysctl.service. May 15 10:18:29.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.822004 kernel: audit: type=1130 audit(1747304309.818:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.866002 kernel: Loading iSCSI transport class v2.0-870. May 15 10:18:29.880007 kernel: iscsi: registered transport (tcp) May 15 10:18:29.896001 kernel: iscsi: registered transport (qla4xxx) May 15 10:18:29.896023 kernel: QLogic iSCSI HBA Driver May 15 10:18:29.933279 systemd[1]: Finished dracut-cmdline.service. May 15 10:18:29.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.934822 systemd[1]: Starting dracut-pre-udev.service... May 15 10:18:29.937315 kernel: audit: type=1130 audit(1747304309.932:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:29.981014 kernel: raid6: neonx8 gen() 13737 MB/s May 15 10:18:29.997992 kernel: raid6: neonx8 xor() 10774 MB/s May 15 10:18:30.014988 kernel: raid6: neonx4 gen() 13532 MB/s May 15 10:18:30.031996 kernel: raid6: neonx4 xor() 11041 MB/s May 15 10:18:30.048987 kernel: raid6: neonx2 gen() 12950 MB/s May 15 10:18:30.065990 kernel: raid6: neonx2 xor() 10356 MB/s May 15 10:18:30.082986 kernel: raid6: neonx1 gen() 10571 MB/s May 15 10:18:30.099985 kernel: raid6: neonx1 xor() 8791 MB/s May 15 10:18:30.116987 kernel: raid6: int64x8 gen() 6273 MB/s May 15 10:18:30.133988 kernel: raid6: int64x8 xor() 3539 MB/s May 15 10:18:30.150989 kernel: raid6: int64x4 gen() 7202 MB/s May 15 10:18:30.167988 kernel: raid6: int64x4 xor() 3852 MB/s May 15 10:18:30.184992 kernel: raid6: int64x2 gen() 6156 MB/s May 15 10:18:30.201995 kernel: raid6: int64x2 xor() 3319 MB/s May 15 10:18:30.218994 kernel: raid6: int64x1 gen() 5047 MB/s May 15 10:18:30.236222 kernel: raid6: int64x1 xor() 2645 MB/s May 15 10:18:30.236234 kernel: raid6: using algorithm neonx8 gen() 13737 MB/s May 15 10:18:30.236242 kernel: raid6: .... xor() 10774 MB/s, rmw enabled May 15 10:18:30.236255 kernel: raid6: using neon recovery algorithm May 15 10:18:30.247121 kernel: xor: measuring software checksum speed May 15 10:18:30.247144 kernel: 8regs : 17191 MB/sec May 15 10:18:30.249348 kernel: 32regs : 20707 MB/sec May 15 10:18:30.250276 kernel: arm64_neon : 1794 MB/sec May 15 10:18:30.250290 kernel: xor: using function: 32regs (20707 MB/sec) May 15 10:18:30.304989 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 15 10:18:30.316132 systemd[1]: Finished dracut-pre-udev.service. May 15 10:18:30.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:30.323975 kernel: audit: type=1130 audit(1747304310.315:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:30.324012 kernel: audit: type=1334 audit(1747304310.318:10): prog-id=7 op=LOAD May 15 10:18:30.318000 audit: BPF prog-id=7 op=LOAD May 15 10:18:30.323000 audit: BPF prog-id=8 op=LOAD May 15 10:18:30.329046 systemd[1]: Starting systemd-udevd.service... May 15 10:18:30.343720 systemd-udevd[492]: Using default interface naming scheme 'v252'. May 15 10:18:30.347136 systemd[1]: Started systemd-udevd.service. May 15 10:18:30.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:30.349661 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:18:30.364687 dracut-pre-trigger[500]: rd.md=0: removing MD RAID activation May 15 10:18:30.398759 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:18:30.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:30.400296 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:18:30.444062 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:18:30.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:30.464051 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:18:30.468315 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:18:30.468338 kernel: GPT:9289727 != 19775487 May 15 10:18:30.468347 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:18:30.468356 kernel: GPT:9289727 != 19775487 May 15 10:18:30.468365 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:18:30.468374 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:18:30.481996 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (551) May 15 10:18:30.482895 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:18:30.487612 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:18:30.494039 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:18:30.497870 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:18:30.501145 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:18:30.505247 systemd[1]: Starting disk-uuid.service... May 15 10:18:30.511236 disk-uuid[569]: Primary Header is updated. May 15 10:18:30.511236 disk-uuid[569]: Secondary Entries is updated. May 15 10:18:30.511236 disk-uuid[569]: Secondary Header is updated. May 15 10:18:30.514002 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:18:30.525994 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:18:31.526531 disk-uuid[570]: The operation has completed successfully. May 15 10:18:31.527734 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:18:31.550874 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:18:31.551902 systemd[1]: Finished disk-uuid.service. May 15 10:18:31.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.554233 systemd[1]: Starting verity-setup.service... May 15 10:18:31.567013 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 15 10:18:31.591098 systemd[1]: Found device dev-mapper-usr.device. May 15 10:18:31.593226 systemd[1]: Mounting sysusr-usr.mount... May 15 10:18:31.595156 systemd[1]: Finished verity-setup.service. May 15 10:18:31.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.645927 systemd[1]: Mounted sysusr-usr.mount. May 15 10:18:31.647033 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:18:31.646653 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:18:31.647440 systemd[1]: Starting ignition-setup.service... May 15 10:18:31.649385 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:18:31.656283 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:18:31.656328 kernel: BTRFS info (device vda6): using free space tree May 15 10:18:31.656337 kernel: BTRFS info (device vda6): has skinny extents May 15 10:18:31.665650 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:18:31.673036 systemd[1]: Finished ignition-setup.service. May 15 10:18:31.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.674557 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:18:31.735734 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:18:31.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.736000 audit: BPF prog-id=9 op=LOAD May 15 10:18:31.737758 systemd[1]: Starting systemd-networkd.service... May 15 10:18:31.762517 ignition[654]: Ignition 2.14.0 May 15 10:18:31.762527 ignition[654]: Stage: fetch-offline May 15 10:18:31.762564 ignition[654]: no configs at "/usr/lib/ignition/base.d" May 15 10:18:31.763379 systemd-networkd[746]: lo: Link UP May 15 10:18:31.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.762573 ignition[654]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:18:31.763383 systemd-networkd[746]: lo: Gained carrier May 15 10:18:31.762700 ignition[654]: parsed url from cmdline: "" May 15 10:18:31.763747 systemd-networkd[746]: Enumeration completed May 15 10:18:31.762703 ignition[654]: no config URL provided May 15 10:18:31.763888 systemd[1]: Started systemd-networkd.service. May 15 10:18:31.762708 ignition[654]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:18:31.763953 systemd-networkd[746]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:18:31.762714 ignition[654]: no config at "/usr/lib/ignition/user.ign" May 15 10:18:31.765492 systemd-networkd[746]: eth0: Link UP May 15 10:18:31.762733 ignition[654]: op(1): [started] loading QEMU firmware config module May 15 10:18:31.765497 systemd-networkd[746]: eth0: Gained carrier May 15 10:18:31.762737 ignition[654]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:18:31.765894 systemd[1]: Reached target network.target. May 15 10:18:31.769442 ignition[654]: op(1): [finished] loading QEMU firmware config module May 15 10:18:31.768287 systemd[1]: Starting iscsiuio.service... May 15 10:18:31.779366 systemd[1]: Started iscsiuio.service. May 15 10:18:31.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.781048 systemd[1]: Starting iscsid.service... May 15 10:18:31.784505 iscsid[753]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:18:31.784505 iscsid[753]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:18:31.784505 iscsid[753]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:18:31.784505 iscsid[753]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:18:31.784505 iscsid[753]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:18:31.784505 iscsid[753]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:18:31.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.785063 systemd-networkd[746]: eth0: DHCPv4 address 10.0.0.84/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:18:31.787540 systemd[1]: Started iscsid.service. May 15 10:18:31.793396 systemd[1]: Starting dracut-initqueue.service... May 15 10:18:31.803889 systemd[1]: Finished dracut-initqueue.service. May 15 10:18:31.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.805009 systemd[1]: Reached target remote-fs-pre.target. May 15 10:18:31.806336 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:18:31.808122 systemd[1]: Reached target remote-fs.target. May 15 10:18:31.810446 systemd[1]: Starting dracut-pre-mount.service... May 15 10:18:31.818259 systemd[1]: Finished dracut-pre-mount.service. May 15 10:18:31.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.835994 ignition[654]: parsing config with SHA512: e78e1bad3624be0b5b8ada950d740f3985d9e44401218a96f3aac2d4b2631f32d9b3f958a15475dc1a881f6eed54753dcf8586cd03f93862f57df45b2f9e3e77 May 15 10:18:31.842711 unknown[654]: fetched base config from "system" May 15 10:18:31.842722 unknown[654]: fetched user config from "qemu" May 15 10:18:31.843168 ignition[654]: fetch-offline: fetch-offline passed May 15 10:18:31.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.844536 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:18:31.843225 ignition[654]: Ignition finished successfully May 15 10:18:31.845869 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:18:31.846693 systemd[1]: Starting ignition-kargs.service... May 15 10:18:31.855646 ignition[767]: Ignition 2.14.0 May 15 10:18:31.855655 ignition[767]: Stage: kargs May 15 10:18:31.855754 ignition[767]: no configs at "/usr/lib/ignition/base.d" May 15 10:18:31.855765 ignition[767]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:18:31.858068 systemd[1]: Finished ignition-kargs.service. May 15 10:18:31.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.856662 ignition[767]: kargs: kargs passed May 15 10:18:31.856706 ignition[767]: Ignition finished successfully May 15 10:18:31.860307 systemd[1]: Starting ignition-disks.service... May 15 10:18:31.867427 ignition[773]: Ignition 2.14.0 May 15 10:18:31.867437 ignition[773]: Stage: disks May 15 10:18:31.867542 ignition[773]: no configs at "/usr/lib/ignition/base.d" May 15 10:18:31.867552 ignition[773]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:18:31.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.870194 systemd[1]: Finished ignition-disks.service. May 15 10:18:31.868458 ignition[773]: disks: disks passed May 15 10:18:31.870875 systemd[1]: Reached target initrd-root-device.target. May 15 10:18:31.868503 ignition[773]: Ignition finished successfully May 15 10:18:31.872293 systemd[1]: Reached target local-fs-pre.target. May 15 10:18:31.873475 systemd[1]: Reached target local-fs.target. May 15 10:18:31.874497 systemd[1]: Reached target sysinit.target. May 15 10:18:31.875703 systemd[1]: Reached target basic.target. May 15 10:18:31.877656 systemd[1]: Starting systemd-fsck-root.service... May 15 10:18:31.887468 systemd-resolved[292]: Detected conflict on linux IN A 10.0.0.84 May 15 10:18:31.887479 systemd-resolved[292]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. May 15 10:18:31.890154 systemd-fsck[781]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 15 10:18:31.892033 systemd[1]: Finished systemd-fsck-root.service. May 15 10:18:31.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.893830 systemd[1]: Mounting sysroot.mount... May 15 10:18:31.900819 systemd[1]: Mounted sysroot.mount. May 15 10:18:31.901942 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:18:31.901458 systemd[1]: Reached target initrd-root-fs.target. May 15 10:18:31.903567 systemd[1]: Mounting sysroot-usr.mount... May 15 10:18:31.904391 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:18:31.904432 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:18:31.904457 systemd[1]: Reached target ignition-diskful.target. May 15 10:18:31.906455 systemd[1]: Mounted sysroot-usr.mount. May 15 10:18:31.907748 systemd[1]: Starting initrd-setup-root.service... May 15 10:18:31.912266 initrd-setup-root[791]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:18:31.917025 initrd-setup-root[799]: cut: /sysroot/etc/group: No such file or directory May 15 10:18:31.921333 initrd-setup-root[807]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:18:31.924962 initrd-setup-root[815]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:18:31.954132 systemd[1]: Finished initrd-setup-root.service. May 15 10:18:31.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.955566 systemd[1]: Starting ignition-mount.service... May 15 10:18:31.956769 systemd[1]: Starting sysroot-boot.service... May 15 10:18:31.961997 bash[832]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:18:31.969994 ignition[834]: INFO : Ignition 2.14.0 May 15 10:18:31.969994 ignition[834]: INFO : Stage: mount May 15 10:18:31.971241 ignition[834]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:18:31.971241 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:18:31.971241 ignition[834]: INFO : mount: mount passed May 15 10:18:31.971241 ignition[834]: INFO : Ignition finished successfully May 15 10:18:31.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:31.973184 systemd[1]: Finished ignition-mount.service. May 15 10:18:31.977136 systemd[1]: Finished sysroot-boot.service. May 15 10:18:31.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:32.601604 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:18:32.608689 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (842) May 15 10:18:32.608735 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:18:32.608745 kernel: BTRFS info (device vda6): using free space tree May 15 10:18:32.609980 kernel: BTRFS info (device vda6): has skinny extents May 15 10:18:32.612696 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:18:32.614175 systemd[1]: Starting ignition-files.service... May 15 10:18:32.629080 ignition[862]: INFO : Ignition 2.14.0 May 15 10:18:32.629080 ignition[862]: INFO : Stage: files May 15 10:18:32.630327 ignition[862]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:18:32.630327 ignition[862]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:18:32.630327 ignition[862]: DEBUG : files: compiled without relabeling support, skipping May 15 10:18:32.639381 ignition[862]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:18:32.639381 ignition[862]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:18:32.642508 ignition[862]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:18:32.643523 ignition[862]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:18:32.644650 unknown[862]: wrote ssh authorized keys file for user: core May 15 10:18:32.645679 ignition[862]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:18:32.645679 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 15 10:18:32.645679 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-arm64.tar.gz: attempt #1 May 15 10:18:32.683986 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:18:32.889618 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 15 10:18:32.889618 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 15 10:18:32.892424 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-arm64.raw: attempt #1 May 15 10:18:33.231371 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:18:33.234131 systemd-networkd[746]: eth0: Gained IPv6LL May 15 10:18:33.433767 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 15 10:18:33.433767 ignition[862]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:18:33.436254 ignition[862]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:18:33.475612 ignition[862]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:18:33.477664 ignition[862]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:18:33.477664 ignition[862]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:18:33.477664 ignition[862]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:18:33.477664 ignition[862]: INFO : files: files passed May 15 10:18:33.477664 ignition[862]: INFO : Ignition finished successfully May 15 10:18:33.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.477704 systemd[1]: Finished ignition-files.service. May 15 10:18:33.480309 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:18:33.481351 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:18:33.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.487699 initrd-setup-root-after-ignition[887]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:18:33.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.482081 systemd[1]: Starting ignition-quench.service... May 15 10:18:33.490862 initrd-setup-root-after-ignition[889]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:18:33.485313 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:18:33.485401 systemd[1]: Finished ignition-quench.service. May 15 10:18:33.487425 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:18:33.488672 systemd[1]: Reached target ignition-complete.target. May 15 10:18:33.491169 systemd[1]: Starting initrd-parse-etc.service... May 15 10:18:33.504871 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:18:33.505000 systemd[1]: Finished initrd-parse-etc.service. May 15 10:18:33.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.506336 systemd[1]: Reached target initrd-fs.target. May 15 10:18:33.507188 systemd[1]: Reached target initrd.target. May 15 10:18:33.508154 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:18:33.508957 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:18:33.519529 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:18:33.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.521288 systemd[1]: Starting initrd-cleanup.service... May 15 10:18:33.529694 systemd[1]: Stopped target nss-lookup.target. May 15 10:18:33.530691 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:18:33.531937 systemd[1]: Stopped target timers.target. May 15 10:18:33.533127 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:18:33.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.533239 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:18:33.534364 systemd[1]: Stopped target initrd.target. May 15 10:18:33.535485 systemd[1]: Stopped target basic.target. May 15 10:18:33.536616 systemd[1]: Stopped target ignition-complete.target. May 15 10:18:33.537798 systemd[1]: Stopped target ignition-diskful.target. May 15 10:18:33.538955 systemd[1]: Stopped target initrd-root-device.target. May 15 10:18:33.540327 systemd[1]: Stopped target remote-fs.target. May 15 10:18:33.541522 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:18:33.542772 systemd[1]: Stopped target sysinit.target. May 15 10:18:33.543862 systemd[1]: Stopped target local-fs.target. May 15 10:18:33.545057 systemd[1]: Stopped target local-fs-pre.target. May 15 10:18:33.546270 systemd[1]: Stopped target swap.target. May 15 10:18:33.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.547310 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:18:33.547431 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:18:33.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.548602 systemd[1]: Stopped target cryptsetup.target. May 15 10:18:33.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.549597 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:18:33.549702 systemd[1]: Stopped dracut-initqueue.service. May 15 10:18:33.550999 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:18:33.551107 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:18:33.552179 systemd[1]: Stopped target paths.target. May 15 10:18:33.553173 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:18:33.555012 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:18:33.556391 systemd[1]: Stopped target slices.target. May 15 10:18:33.557464 systemd[1]: Stopped target sockets.target. May 15 10:18:33.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.558772 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:18:33.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.558843 systemd[1]: Closed iscsid.socket. May 15 10:18:33.559904 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:18:33.560043 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:18:33.561235 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:18:33.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.561325 systemd[1]: Stopped ignition-files.service. May 15 10:18:33.563183 systemd[1]: Stopping ignition-mount.service... May 15 10:18:33.564043 systemd[1]: Stopping iscsiuio.service... May 15 10:18:33.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.565619 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:18:33.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.565748 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:18:33.572438 ignition[902]: INFO : Ignition 2.14.0 May 15 10:18:33.572438 ignition[902]: INFO : Stage: umount May 15 10:18:33.572438 ignition[902]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:18:33.572438 ignition[902]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:18:33.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.567797 systemd[1]: Stopping sysroot-boot.service... May 15 10:18:33.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.577453 ignition[902]: INFO : umount: umount passed May 15 10:18:33.577453 ignition[902]: INFO : Ignition finished successfully May 15 10:18:33.568721 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:18:33.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.568864 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:18:33.570057 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:18:33.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.570163 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:18:33.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.572761 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:18:33.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.572863 systemd[1]: Stopped iscsiuio.service. May 15 10:18:33.574175 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:18:33.574237 systemd[1]: Closed iscsiuio.socket. May 15 10:18:33.575735 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:18:33.575807 systemd[1]: Finished initrd-cleanup.service. May 15 10:18:33.578209 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:18:33.578286 systemd[1]: Stopped ignition-mount.service. May 15 10:18:33.579547 systemd[1]: Stopped target network.target. May 15 10:18:33.580701 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:18:33.580752 systemd[1]: Stopped ignition-disks.service. May 15 10:18:33.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.581991 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:18:33.582033 systemd[1]: Stopped ignition-kargs.service. May 15 10:18:33.583347 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:18:33.583384 systemd[1]: Stopped ignition-setup.service. May 15 10:18:33.584843 systemd[1]: Stopping systemd-networkd.service... May 15 10:18:33.586076 systemd[1]: Stopping systemd-resolved.service... May 15 10:18:33.587845 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:18:33.593339 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:18:33.593436 systemd[1]: Stopped systemd-resolved.service. May 15 10:18:33.599050 systemd-networkd[746]: eth0: DHCPv6 lease lost May 15 10:18:33.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.600184 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:18:33.602000 audit: BPF prog-id=6 op=UNLOAD May 15 10:18:33.600277 systemd[1]: Stopped systemd-networkd.service. May 15 10:18:33.601663 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:18:33.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.601694 systemd[1]: Closed systemd-networkd.socket. May 15 10:18:33.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.603322 systemd[1]: Stopping network-cleanup.service... May 15 10:18:33.604652 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:18:33.608000 audit: BPF prog-id=9 op=UNLOAD May 15 10:18:33.604712 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:18:33.606032 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:18:33.606077 systemd[1]: Stopped systemd-sysctl.service. May 15 10:18:33.608012 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:18:33.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.608058 systemd[1]: Stopped systemd-modules-load.service. May 15 10:18:33.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.609233 systemd[1]: Stopping systemd-udevd.service... May 15 10:18:33.614229 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:18:33.616838 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:18:33.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.616992 systemd[1]: Stopped systemd-udevd.service. May 15 10:18:33.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.617930 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:18:33.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.618047 systemd[1]: Stopped network-cleanup.service. May 15 10:18:33.619329 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:18:33.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.619363 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:18:33.620445 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:18:33.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.620477 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:18:33.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.621719 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:18:33.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.621766 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:18:33.623359 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:18:33.623404 systemd[1]: Stopped dracut-cmdline.service. May 15 10:18:33.625006 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:18:33.625051 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:18:33.627198 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:18:33.628031 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:18:33.628085 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:18:33.631005 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:18:33.631101 systemd[1]: Stopped sysroot-boot.service. May 15 10:18:33.632290 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:18:33.632335 systemd[1]: Stopped initrd-setup-root.service. May 15 10:18:33.634023 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:18:33.634115 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:18:33.635387 systemd[1]: Reached target initrd-switch-root.target. May 15 10:18:33.637583 systemd[1]: Starting initrd-switch-root.service... May 15 10:18:33.644299 systemd[1]: Switching root. May 15 10:18:33.661398 iscsid[753]: iscsid shutting down. May 15 10:18:33.662183 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 15 10:18:33.662231 systemd-journald[290]: Journal stopped May 15 10:18:35.659949 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:18:35.660024 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:18:35.660036 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:18:35.660049 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:18:35.660058 kernel: SELinux: policy capability open_perms=1 May 15 10:18:35.660068 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:18:35.660078 kernel: SELinux: policy capability always_check_network=0 May 15 10:18:35.660088 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:18:35.660097 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:18:35.660106 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:18:35.660116 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:18:35.660130 systemd[1]: Successfully loaded SELinux policy in 32.480ms. May 15 10:18:35.660148 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.237ms. May 15 10:18:35.660159 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:18:35.660171 systemd[1]: Detected virtualization kvm. May 15 10:18:35.660181 systemd[1]: Detected architecture arm64. May 15 10:18:35.660191 systemd[1]: Detected first boot. May 15 10:18:35.660201 systemd[1]: Initializing machine ID from VM UUID. May 15 10:18:35.660211 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:18:35.660221 systemd[1]: Populated /etc with preset unit settings. May 15 10:18:35.660233 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:18:35.660247 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:18:35.660260 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:18:35.660271 kernel: kauditd_printk_skb: 78 callbacks suppressed May 15 10:18:35.660281 kernel: audit: type=1334 audit(1747304315.532:82): prog-id=12 op=LOAD May 15 10:18:35.660290 kernel: audit: type=1334 audit(1747304315.532:83): prog-id=3 op=UNLOAD May 15 10:18:35.660300 kernel: audit: type=1334 audit(1747304315.532:84): prog-id=13 op=LOAD May 15 10:18:35.660309 kernel: audit: type=1334 audit(1747304315.532:85): prog-id=14 op=LOAD May 15 10:18:35.660320 kernel: audit: type=1334 audit(1747304315.532:86): prog-id=4 op=UNLOAD May 15 10:18:35.660329 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:18:35.660343 kernel: audit: type=1334 audit(1747304315.532:87): prog-id=5 op=UNLOAD May 15 10:18:35.660355 systemd[1]: Stopped iscsid.service. May 15 10:18:35.660366 kernel: audit: type=1334 audit(1747304315.534:88): prog-id=15 op=LOAD May 15 10:18:35.660379 kernel: audit: type=1334 audit(1747304315.534:89): prog-id=12 op=UNLOAD May 15 10:18:35.660390 kernel: audit: type=1334 audit(1747304315.534:90): prog-id=16 op=LOAD May 15 10:18:35.660402 kernel: audit: type=1334 audit(1747304315.535:91): prog-id=17 op=LOAD May 15 10:18:35.660412 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:18:35.660423 systemd[1]: Stopped initrd-switch-root.service. May 15 10:18:35.660433 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:18:35.660444 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:18:35.660455 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:18:35.660467 systemd[1]: Created slice system-getty.slice. May 15 10:18:35.660477 systemd[1]: Created slice system-modprobe.slice. May 15 10:18:35.660488 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:18:35.660498 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:18:35.660512 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:18:35.660522 systemd[1]: Created slice user.slice. May 15 10:18:35.660532 systemd[1]: Started systemd-ask-password-console.path. May 15 10:18:35.660543 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:18:35.660553 systemd[1]: Set up automount boot.automount. May 15 10:18:35.660564 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:18:35.660575 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:18:35.660587 systemd[1]: Stopped target initrd-fs.target. May 15 10:18:35.660597 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:18:35.660608 systemd[1]: Reached target integritysetup.target. May 15 10:18:35.660618 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:18:35.660628 systemd[1]: Reached target remote-fs.target. May 15 10:18:35.660638 systemd[1]: Reached target slices.target. May 15 10:18:35.660649 systemd[1]: Reached target swap.target. May 15 10:18:35.660659 systemd[1]: Reached target torcx.target. May 15 10:18:35.660671 systemd[1]: Reached target veritysetup.target. May 15 10:18:35.660681 systemd[1]: Listening on systemd-coredump.socket. May 15 10:18:35.660692 systemd[1]: Listening on systemd-initctl.socket. May 15 10:18:35.660702 systemd[1]: Listening on systemd-networkd.socket. May 15 10:18:35.660712 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:18:35.660723 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:18:35.660733 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:18:35.660743 systemd[1]: Mounting dev-hugepages.mount... May 15 10:18:35.660754 systemd[1]: Mounting dev-mqueue.mount... May 15 10:18:35.660765 systemd[1]: Mounting media.mount... May 15 10:18:35.660775 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:18:35.660785 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:18:35.660796 systemd[1]: Mounting tmp.mount... May 15 10:18:35.660807 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:18:35.660817 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:18:35.660827 systemd[1]: Starting kmod-static-nodes.service... May 15 10:18:35.660838 systemd[1]: Starting modprobe@configfs.service... May 15 10:18:35.660848 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:18:35.660859 systemd[1]: Starting modprobe@drm.service... May 15 10:18:35.660874 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:18:35.660885 systemd[1]: Starting modprobe@fuse.service... May 15 10:18:35.660895 systemd[1]: Starting modprobe@loop.service... May 15 10:18:35.660906 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:18:35.660916 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:18:35.660927 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:18:35.660937 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:18:35.660948 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:18:35.660959 systemd[1]: Stopped systemd-journald.service. May 15 10:18:35.660974 systemd[1]: Starting systemd-journald.service... May 15 10:18:35.660984 kernel: loop: module loaded May 15 10:18:35.660994 kernel: fuse: init (API version 7.34) May 15 10:18:35.661004 systemd[1]: Starting systemd-modules-load.service... May 15 10:18:35.661014 systemd[1]: Starting systemd-network-generator.service... May 15 10:18:35.661024 systemd[1]: Starting systemd-remount-fs.service... May 15 10:18:35.661036 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:18:35.661046 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:18:35.661057 systemd[1]: Stopped verity-setup.service. May 15 10:18:35.661068 systemd[1]: Mounted dev-hugepages.mount. May 15 10:18:35.661078 systemd[1]: Mounted dev-mqueue.mount. May 15 10:18:35.661090 systemd[1]: Mounted media.mount. May 15 10:18:35.661100 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:18:35.661110 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:18:35.661120 systemd[1]: Mounted tmp.mount. May 15 10:18:35.661131 systemd[1]: Finished kmod-static-nodes.service. May 15 10:18:35.661141 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:18:35.661154 systemd-journald[997]: Journal started May 15 10:18:35.661195 systemd-journald[997]: Runtime Journal (/run/log/journal/e8ae413e21ff457a8ed3f0cc39a56b54) is 6.0M, max 48.7M, 42.6M free. May 15 10:18:33.724000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:18:33.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:18:33.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:18:33.803000 audit: BPF prog-id=10 op=LOAD May 15 10:18:33.803000 audit: BPF prog-id=10 op=UNLOAD May 15 10:18:33.803000 audit: BPF prog-id=11 op=LOAD May 15 10:18:33.803000 audit: BPF prog-id=11 op=UNLOAD May 15 10:18:33.853000 audit[935]: AVC avc: denied { associate } for pid=935 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:18:33.853000 audit[935]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf040 a3=32 items=0 ppid=918 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:33.853000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:18:33.854000 audit[935]: AVC avc: denied { associate } for pid=935 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:18:33.854000 audit[935]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5979 a2=1ed a3=0 items=2 ppid=918 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:33.854000 audit: CWD cwd="/" May 15 10:18:33.854000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:18:33.854000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:18:33.854000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:18:35.532000 audit: BPF prog-id=12 op=LOAD May 15 10:18:35.532000 audit: BPF prog-id=3 op=UNLOAD May 15 10:18:35.532000 audit: BPF prog-id=13 op=LOAD May 15 10:18:35.532000 audit: BPF prog-id=14 op=LOAD May 15 10:18:35.532000 audit: BPF prog-id=4 op=UNLOAD May 15 10:18:35.532000 audit: BPF prog-id=5 op=UNLOAD May 15 10:18:35.534000 audit: BPF prog-id=15 op=LOAD May 15 10:18:35.534000 audit: BPF prog-id=12 op=UNLOAD May 15 10:18:35.534000 audit: BPF prog-id=16 op=LOAD May 15 10:18:35.535000 audit: BPF prog-id=17 op=LOAD May 15 10:18:35.535000 audit: BPF prog-id=13 op=UNLOAD May 15 10:18:35.535000 audit: BPF prog-id=14 op=UNLOAD May 15 10:18:35.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.544000 audit: BPF prog-id=15 op=UNLOAD May 15 10:18:35.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.630000 audit: BPF prog-id=18 op=LOAD May 15 10:18:35.634000 audit: BPF prog-id=19 op=LOAD May 15 10:18:35.634000 audit: BPF prog-id=20 op=LOAD May 15 10:18:35.634000 audit: BPF prog-id=16 op=UNLOAD May 15 10:18:35.634000 audit: BPF prog-id=17 op=UNLOAD May 15 10:18:35.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.658000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:18:35.658000 audit[997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=fffffd1b7fd0 a2=4000 a3=1 items=0 ppid=1 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:35.658000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:18:35.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.531918 systemd[1]: Queued start job for default target multi-user.target. May 15 10:18:33.851680 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:18:35.531930 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:18:35.662472 systemd[1]: Finished modprobe@configfs.service. May 15 10:18:33.851962 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:18:35.536790 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:18:35.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:33.851996 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:18:33.852029 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:18:33.852039 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:18:33.852077 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:18:33.852089 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:18:33.852290 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:18:33.852324 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:18:33.852337 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:18:33.853608 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:18:33.853653 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:18:33.853674 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:18:33.853691 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:18:33.853713 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:18:33.853727 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:18:35.279726 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:18:35.280003 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:18:35.280104 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:18:35.280266 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:18:35.280318 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:18:35.280372 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2025-05-15T10:18:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:18:35.664001 systemd[1]: Started systemd-journald.service. May 15 10:18:35.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.664526 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:18:35.666158 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:18:35.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.667294 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:18:35.667445 systemd[1]: Finished modprobe@drm.service. May 15 10:18:35.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.668510 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:18:35.668665 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:18:35.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.669780 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:18:35.669948 systemd[1]: Finished modprobe@fuse.service. May 15 10:18:35.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.670968 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:18:35.671213 systemd[1]: Finished modprobe@loop.service. May 15 10:18:35.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.672293 systemd[1]: Finished systemd-modules-load.service. May 15 10:18:35.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.673542 systemd[1]: Finished systemd-network-generator.service. May 15 10:18:35.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.674790 systemd[1]: Finished systemd-remount-fs.service. May 15 10:18:35.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.676301 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:18:35.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.677305 systemd[1]: Reached target network-pre.target. May 15 10:18:35.679278 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:18:35.681270 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:18:35.682036 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:18:35.684576 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:18:35.686424 systemd[1]: Starting systemd-journal-flush.service... May 15 10:18:35.687369 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:18:35.688406 systemd[1]: Starting systemd-random-seed.service... May 15 10:18:35.689255 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:18:35.690206 systemd[1]: Starting systemd-sysctl.service... May 15 10:18:35.691750 systemd-journald[997]: Time spent on flushing to /var/log/journal/e8ae413e21ff457a8ed3f0cc39a56b54 is 13.717ms for 994 entries. May 15 10:18:35.691750 systemd-journald[997]: System Journal (/var/log/journal/e8ae413e21ff457a8ed3f0cc39a56b54) is 8.0M, max 195.6M, 187.6M free. May 15 10:18:35.718074 systemd-journald[997]: Received client request to flush runtime journal. May 15 10:18:35.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:35.691923 systemd[1]: Starting systemd-sysusers.service... May 15 10:18:35.695909 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:18:35.719256 udevadm[1036]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:18:35.700154 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:18:35.701188 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:18:35.703062 systemd[1]: Starting systemd-udev-settle.service... May 15 10:18:35.706590 systemd[1]: Finished systemd-random-seed.service. May 15 10:18:35.707567 systemd[1]: Reached target first-boot-complete.target. May 15 10:18:35.708656 systemd[1]: Finished systemd-sysctl.service. May 15 10:18:35.716790 systemd[1]: Finished systemd-sysusers.service. May 15 10:18:35.718958 systemd[1]: Finished systemd-journal-flush.service. May 15 10:18:35.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.038674 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:18:36.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.039000 audit: BPF prog-id=21 op=LOAD May 15 10:18:36.039000 audit: BPF prog-id=22 op=LOAD May 15 10:18:36.039000 audit: BPF prog-id=7 op=UNLOAD May 15 10:18:36.039000 audit: BPF prog-id=8 op=UNLOAD May 15 10:18:36.040783 systemd[1]: Starting systemd-udevd.service... May 15 10:18:36.062734 systemd-udevd[1038]: Using default interface naming scheme 'v252'. May 15 10:18:36.074389 systemd[1]: Started systemd-udevd.service. May 15 10:18:36.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.075000 audit: BPF prog-id=23 op=LOAD May 15 10:18:36.076918 systemd[1]: Starting systemd-networkd.service... May 15 10:18:36.096000 audit: BPF prog-id=24 op=LOAD May 15 10:18:36.096000 audit: BPF prog-id=25 op=LOAD May 15 10:18:36.096000 audit: BPF prog-id=26 op=LOAD May 15 10:18:36.097771 systemd[1]: Starting systemd-userdbd.service... May 15 10:18:36.108759 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 15 10:18:36.124691 systemd[1]: Started systemd-userdbd.service. May 15 10:18:36.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.149784 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:18:36.177005 systemd-networkd[1047]: lo: Link UP May 15 10:18:36.177013 systemd-networkd[1047]: lo: Gained carrier May 15 10:18:36.177335 systemd-networkd[1047]: Enumeration completed May 15 10:18:36.177435 systemd[1]: Started systemd-networkd.service. May 15 10:18:36.177436 systemd-networkd[1047]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:18:36.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.178609 systemd-networkd[1047]: eth0: Link UP May 15 10:18:36.178617 systemd-networkd[1047]: eth0: Gained carrier May 15 10:18:36.187317 systemd[1]: Finished systemd-udev-settle.service. May 15 10:18:36.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.189311 systemd[1]: Starting lvm2-activation-early.service... May 15 10:18:36.198556 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:18:36.198738 systemd-networkd[1047]: eth0: DHCPv4 address 10.0.0.84/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:18:36.224737 systemd[1]: Finished lvm2-activation-early.service. May 15 10:18:36.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.225763 systemd[1]: Reached target cryptsetup.target. May 15 10:18:36.227696 systemd[1]: Starting lvm2-activation.service... May 15 10:18:36.231248 lvm[1072]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:18:36.257770 systemd[1]: Finished lvm2-activation.service. May 15 10:18:36.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.258745 systemd[1]: Reached target local-fs-pre.target. May 15 10:18:36.259629 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:18:36.259661 systemd[1]: Reached target local-fs.target. May 15 10:18:36.260444 systemd[1]: Reached target machines.target. May 15 10:18:36.262370 systemd[1]: Starting ldconfig.service... May 15 10:18:36.263397 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:18:36.263450 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:18:36.264538 systemd[1]: Starting systemd-boot-update.service... May 15 10:18:36.266304 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:18:36.268512 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:18:36.270457 systemd[1]: Starting systemd-sysext.service... May 15 10:18:36.271560 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1074 (bootctl) May 15 10:18:36.272607 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:18:36.277330 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:18:36.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.282955 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:18:36.286588 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:18:36.286764 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:18:36.299069 kernel: loop0: detected capacity change from 0 to 201592 May 15 10:18:36.341063 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:18:36.341717 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:18:36.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.348020 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:18:36.357215 systemd-fsck[1082]: fsck.fat 4.2 (2021-01-31) May 15 10:18:36.357215 systemd-fsck[1082]: /dev/vda1: 236 files, 117182/258078 clusters May 15 10:18:36.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.360957 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:18:36.363019 systemd[1]: Mounting boot.mount... May 15 10:18:36.365990 kernel: loop1: detected capacity change from 0 to 201592 May 15 10:18:36.369893 systemd[1]: Mounted boot.mount. May 15 10:18:36.373223 (sd-sysext)[1087]: Using extensions 'kubernetes'. May 15 10:18:36.373555 (sd-sysext)[1087]: Merged extensions into '/usr'. May 15 10:18:36.377989 systemd[1]: Finished systemd-boot-update.service. May 15 10:18:36.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.390489 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:18:36.391703 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:18:36.393838 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:18:36.395913 systemd[1]: Starting modprobe@loop.service... May 15 10:18:36.396924 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:18:36.397059 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:18:36.397798 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:18:36.397937 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:18:36.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.399365 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:18:36.399479 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:18:36.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.400906 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:18:36.401044 systemd[1]: Finished modprobe@loop.service. May 15 10:18:36.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.402365 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:18:36.402465 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:18:36.448720 ldconfig[1073]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:18:36.452073 systemd[1]: Finished ldconfig.service. May 15 10:18:36.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.652347 systemd[1]: Mounting usr-share-oem.mount... May 15 10:18:36.657154 systemd[1]: Mounted usr-share-oem.mount. May 15 10:18:36.658998 systemd[1]: Finished systemd-sysext.service. May 15 10:18:36.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.661064 systemd[1]: Starting ensure-sysext.service... May 15 10:18:36.662768 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:18:36.667011 systemd[1]: Reloading. May 15 10:18:36.674027 systemd-tmpfiles[1095]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:18:36.676373 systemd-tmpfiles[1095]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:18:36.679910 systemd-tmpfiles[1095]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:18:36.701483 /usr/lib/systemd/system-generators/torcx-generator[1115]: time="2025-05-15T10:18:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:18:36.701783 /usr/lib/systemd/system-generators/torcx-generator[1115]: time="2025-05-15T10:18:36Z" level=info msg="torcx already run" May 15 10:18:36.763496 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:18:36.763522 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:18:36.779947 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:18:36.823000 audit: BPF prog-id=27 op=LOAD May 15 10:18:36.823000 audit: BPF prog-id=18 op=UNLOAD May 15 10:18:36.824000 audit: BPF prog-id=28 op=LOAD May 15 10:18:36.824000 audit: BPF prog-id=29 op=LOAD May 15 10:18:36.824000 audit: BPF prog-id=19 op=UNLOAD May 15 10:18:36.824000 audit: BPF prog-id=20 op=UNLOAD May 15 10:18:36.824000 audit: BPF prog-id=30 op=LOAD May 15 10:18:36.824000 audit: BPF prog-id=24 op=UNLOAD May 15 10:18:36.824000 audit: BPF prog-id=31 op=LOAD May 15 10:18:36.824000 audit: BPF prog-id=32 op=LOAD May 15 10:18:36.824000 audit: BPF prog-id=25 op=UNLOAD May 15 10:18:36.824000 audit: BPF prog-id=26 op=UNLOAD May 15 10:18:36.825000 audit: BPF prog-id=33 op=LOAD May 15 10:18:36.825000 audit: BPF prog-id=34 op=LOAD May 15 10:18:36.825000 audit: BPF prog-id=21 op=UNLOAD May 15 10:18:36.825000 audit: BPF prog-id=22 op=UNLOAD May 15 10:18:36.826000 audit: BPF prog-id=35 op=LOAD May 15 10:18:36.826000 audit: BPF prog-id=23 op=UNLOAD May 15 10:18:36.830178 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:18:36.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.835713 systemd[1]: Starting audit-rules.service... May 15 10:18:36.842747 systemd[1]: Starting clean-ca-certificates.service... May 15 10:18:36.845023 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:18:36.847000 audit: BPF prog-id=36 op=LOAD May 15 10:18:36.850388 systemd[1]: Starting systemd-resolved.service... May 15 10:18:36.853290 systemd[1]: Starting systemd-timesyncd.service... May 15 10:18:36.855097 systemd[1]: Starting systemd-update-utmp.service... May 15 10:18:36.851000 audit: BPF prog-id=37 op=LOAD May 15 10:18:36.862000 audit[1163]: SYSTEM_BOOT pid=1163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:18:36.868806 systemd[1]: Finished systemd-update-utmp.service. May 15 10:18:36.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.869993 systemd[1]: Finished clean-ca-certificates.service. May 15 10:18:36.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.871124 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:18:36.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.872279 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:18:36.873570 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:18:36.875640 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:18:36.877601 systemd[1]: Starting modprobe@loop.service... May 15 10:18:36.878392 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:18:36.878530 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:18:36.879749 systemd[1]: Starting systemd-update-done.service... May 15 10:18:36.880691 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:18:36.881605 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:18:36.881727 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:18:36.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.882996 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:18:36.883108 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:18:36.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.884350 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:18:36.884465 systemd[1]: Finished modprobe@loop.service. May 15 10:18:36.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.885712 systemd[1]: Finished systemd-update-done.service. May 15 10:18:36.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.888165 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:18:36.890037 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:18:36.893260 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:18:36.895287 systemd[1]: Starting modprobe@loop.service... May 15 10:18:36.896029 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:18:36.896157 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:18:36.896255 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:18:36.897070 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:18:36.897220 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:18:36.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.898533 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:18:36.898643 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:18:36.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.899928 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:18:36.900053 systemd[1]: Finished modprobe@loop.service. May 15 10:18:36.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:36.901299 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:18:36.901393 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:18:36.901000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:18:36.901000 audit[1181]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd4c479a0 a2=420 a3=0 items=0 ppid=1152 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:36.901000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:18:36.902375 augenrules[1181]: No rules May 15 10:18:36.903036 systemd[1]: Finished audit-rules.service. May 15 10:18:36.906195 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:18:36.907501 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:18:36.909740 systemd[1]: Starting modprobe@drm.service... May 15 10:18:36.911205 systemd-timesyncd[1162]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:18:36.911257 systemd-timesyncd[1162]: Initial clock synchronization to Thu 2025-05-15 10:18:37.103784 UTC. May 15 10:18:36.912092 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:18:36.914348 systemd[1]: Starting modprobe@loop.service... May 15 10:18:36.915314 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:18:36.915467 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:18:36.916839 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:18:36.918112 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:18:36.918958 systemd[1]: Started systemd-timesyncd.service. May 15 10:18:36.919256 systemd-resolved[1161]: Positive Trust Anchors: May 15 10:18:36.919447 systemd-resolved[1161]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:18:36.919523 systemd-resolved[1161]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:18:36.920549 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:18:36.920687 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:18:36.922021 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:18:36.922135 systemd[1]: Finished modprobe@drm.service. May 15 10:18:36.923353 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:18:36.923465 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:18:36.924762 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:18:36.924883 systemd[1]: Finished modprobe@loop.service. May 15 10:18:36.926337 systemd[1]: Reached target time-set.target. May 15 10:18:36.927154 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:18:36.927198 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:18:36.927471 systemd[1]: Finished ensure-sysext.service. May 15 10:18:36.929767 systemd-resolved[1161]: Defaulting to hostname 'linux'. May 15 10:18:36.931188 systemd[1]: Started systemd-resolved.service. May 15 10:18:36.932226 systemd[1]: Reached target network.target. May 15 10:18:36.932999 systemd[1]: Reached target nss-lookup.target. May 15 10:18:36.933763 systemd[1]: Reached target sysinit.target. May 15 10:18:36.934608 systemd[1]: Started motdgen.path. May 15 10:18:36.935337 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:18:36.936677 systemd[1]: Started logrotate.timer. May 15 10:18:36.937519 systemd[1]: Started mdadm.timer. May 15 10:18:36.938205 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:18:36.939035 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:18:36.939067 systemd[1]: Reached target paths.target. May 15 10:18:36.939781 systemd[1]: Reached target timers.target. May 15 10:18:36.940889 systemd[1]: Listening on dbus.socket. May 15 10:18:36.942566 systemd[1]: Starting docker.socket... May 15 10:18:36.945884 systemd[1]: Listening on sshd.socket. May 15 10:18:36.946793 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:18:36.947245 systemd[1]: Listening on docker.socket. May 15 10:18:36.948089 systemd[1]: Reached target sockets.target. May 15 10:18:36.948828 systemd[1]: Reached target basic.target. May 15 10:18:36.949637 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:18:36.949673 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:18:36.950680 systemd[1]: Starting containerd.service... May 15 10:18:36.952437 systemd[1]: Starting dbus.service... May 15 10:18:36.954048 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:18:36.956126 systemd[1]: Starting extend-filesystems.service... May 15 10:18:36.957016 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:18:36.958328 systemd[1]: Starting motdgen.service... May 15 10:18:36.961093 systemd[1]: Starting prepare-helm.service... May 15 10:18:36.963030 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:18:36.963472 jq[1196]: false May 15 10:18:36.965457 systemd[1]: Starting sshd-keygen.service... May 15 10:18:36.968320 systemd[1]: Starting systemd-logind.service... May 15 10:18:36.969252 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:18:36.969324 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:18:36.969713 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:18:36.970422 systemd[1]: Starting update-engine.service... May 15 10:18:36.972792 extend-filesystems[1197]: Found loop1 May 15 10:18:36.972792 extend-filesystems[1197]: Found vda May 15 10:18:36.972792 extend-filesystems[1197]: Found vda1 May 15 10:18:36.972792 extend-filesystems[1197]: Found vda2 May 15 10:18:36.972792 extend-filesystems[1197]: Found vda3 May 15 10:18:36.972792 extend-filesystems[1197]: Found usr May 15 10:18:36.972792 extend-filesystems[1197]: Found vda4 May 15 10:18:36.972792 extend-filesystems[1197]: Found vda6 May 15 10:18:36.972792 extend-filesystems[1197]: Found vda7 May 15 10:18:36.972792 extend-filesystems[1197]: Found vda9 May 15 10:18:36.972792 extend-filesystems[1197]: Checking size of /dev/vda9 May 15 10:18:36.972999 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:18:36.987528 dbus-daemon[1195]: [system] SELinux support is enabled May 15 10:18:36.978478 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:18:36.998964 jq[1211]: true May 15 10:18:36.999151 extend-filesystems[1197]: Resized partition /dev/vda9 May 15 10:18:36.978655 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:18:36.979668 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:18:37.002527 tar[1217]: linux-arm64/LICENSE May 15 10:18:37.002527 tar[1217]: linux-arm64/helm May 15 10:18:36.979830 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:18:37.002819 jq[1220]: true May 15 10:18:36.987701 systemd[1]: Started dbus.service. May 15 10:18:36.994521 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:18:36.994555 systemd[1]: Reached target system-config.target. May 15 10:18:36.995334 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:18:36.995353 systemd[1]: Reached target user-config.target. May 15 10:18:36.996267 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:18:36.996424 systemd[1]: Finished motdgen.service. May 15 10:18:37.037384 systemd-logind[1207]: Watching system buttons on /dev/input/event0 (Power Button) May 15 10:18:37.038261 systemd-logind[1207]: New seat seat0. May 15 10:18:37.040615 extend-filesystems[1226]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:18:37.043361 systemd[1]: Started systemd-logind.service. May 15 10:18:37.045981 bash[1246]: Updated "/home/core/.ssh/authorized_keys" May 15 10:18:37.047820 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:18:37.062007 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:18:37.086009 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:18:37.086398 env[1221]: time="2025-05-15T10:18:37.086343988Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:18:37.089702 update_engine[1209]: I0515 10:18:37.089489 1209 main.cc:92] Flatcar Update Engine starting May 15 10:18:37.098274 update_engine[1209]: I0515 10:18:37.096704 1209 update_check_scheduler.cc:74] Next update check in 2m23s May 15 10:18:37.098325 extend-filesystems[1226]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:18:37.098325 extend-filesystems[1226]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:18:37.098325 extend-filesystems[1226]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:18:37.091895 systemd[1]: Started update-engine.service. May 15 10:18:37.101996 extend-filesystems[1197]: Resized filesystem in /dev/vda9 May 15 10:18:37.095205 systemd[1]: Started locksmithd.service. May 15 10:18:37.102093 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:18:37.102295 systemd[1]: Finished extend-filesystems.service. May 15 10:18:37.108851 env[1221]: time="2025-05-15T10:18:37.108813721Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:18:37.109192 env[1221]: time="2025-05-15T10:18:37.109166537Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:18:37.110854 env[1221]: time="2025-05-15T10:18:37.110819486Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:18:37.110931 env[1221]: time="2025-05-15T10:18:37.110910179Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:18:37.111194 env[1221]: time="2025-05-15T10:18:37.111166445Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:18:37.111227 env[1221]: time="2025-05-15T10:18:37.111194259Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:18:37.111227 env[1221]: time="2025-05-15T10:18:37.111209456Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:18:37.111227 env[1221]: time="2025-05-15T10:18:37.111220844Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:18:37.111314 env[1221]: time="2025-05-15T10:18:37.111295602Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:18:37.111669 env[1221]: time="2025-05-15T10:18:37.111645387Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:18:37.111862 env[1221]: time="2025-05-15T10:18:37.111836726Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:18:37.111891 env[1221]: time="2025-05-15T10:18:37.111862205Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:18:37.112210 env[1221]: time="2025-05-15T10:18:37.112188969Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:18:37.112246 env[1221]: time="2025-05-15T10:18:37.112211745Z" level=info msg="metadata content store policy set" policy=shared May 15 10:18:37.115781 env[1221]: time="2025-05-15T10:18:37.115731553Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:18:37.115781 env[1221]: time="2025-05-15T10:18:37.115766290Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:18:37.115781 env[1221]: time="2025-05-15T10:18:37.115779521Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:18:37.115940 env[1221]: time="2025-05-15T10:18:37.115816224Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:18:37.115940 env[1221]: time="2025-05-15T10:18:37.115929446Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:18:37.116106 env[1221]: time="2025-05-15T10:18:37.115946774Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:18:37.116106 env[1221]: time="2025-05-15T10:18:37.115960169Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:18:37.116608 env[1221]: time="2025-05-15T10:18:37.116439561Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:18:37.116608 env[1221]: time="2025-05-15T10:18:37.116532753Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:18:37.116608 env[1221]: time="2025-05-15T10:18:37.116560403Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:18:37.116608 env[1221]: time="2025-05-15T10:18:37.116573265Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:18:37.116608 env[1221]: time="2025-05-15T10:18:37.116592354Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:18:37.116778 env[1221]: time="2025-05-15T10:18:37.116754896Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:18:37.117128 env[1221]: time="2025-05-15T10:18:37.117105050Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:18:37.117580 env[1221]: time="2025-05-15T10:18:37.117545692Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:18:37.117627 env[1221]: time="2025-05-15T10:18:37.117593414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:18:37.117627 env[1221]: time="2025-05-15T10:18:37.117608980Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:18:37.117892 env[1221]: time="2025-05-15T10:18:37.117872210Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:18:37.117929 env[1221]: time="2025-05-15T10:18:37.117897484Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:18:37.117929 env[1221]: time="2025-05-15T10:18:37.117911740Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:18:37.117929 env[1221]: time="2025-05-15T10:18:37.117923783Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118018 env[1221]: time="2025-05-15T10:18:37.117936113Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118018 env[1221]: time="2025-05-15T10:18:37.117948565Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118018 env[1221]: time="2025-05-15T10:18:37.117960813Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118018 env[1221]: time="2025-05-15T10:18:37.117972488Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118099 env[1221]: time="2025-05-15T10:18:37.118016319Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:18:37.118237 env[1221]: time="2025-05-15T10:18:37.118213721Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118266 env[1221]: time="2025-05-15T10:18:37.118239486Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118266 env[1221]: time="2025-05-15T10:18:37.118252718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118352 env[1221]: time="2025-05-15T10:18:37.118265047Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:18:37.118386 env[1221]: time="2025-05-15T10:18:37.118360656Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:18:37.118386 env[1221]: time="2025-05-15T10:18:37.118377369Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:18:37.118431 env[1221]: time="2025-05-15T10:18:37.118395106Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:18:37.118452 env[1221]: time="2025-05-15T10:18:37.118428491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:18:37.118806 env[1221]: time="2025-05-15T10:18:37.118748864Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:18:37.119730 env[1221]: time="2025-05-15T10:18:37.118812808Z" level=info msg="Connect containerd service" May 15 10:18:37.119730 env[1221]: time="2025-05-15T10:18:37.118895636Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:18:37.119939 env[1221]: time="2025-05-15T10:18:37.119911483Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:18:37.120219 env[1221]: time="2025-05-15T10:18:37.120178400Z" level=info msg="Start subscribing containerd event" May 15 10:18:37.120249 env[1221]: time="2025-05-15T10:18:37.120236895Z" level=info msg="Start recovering state" May 15 10:18:37.120314 env[1221]: time="2025-05-15T10:18:37.120298545Z" level=info msg="Start event monitor" May 15 10:18:37.120353 env[1221]: time="2025-05-15T10:18:37.120323696Z" level=info msg="Start snapshots syncer" May 15 10:18:37.120353 env[1221]: time="2025-05-15T10:18:37.120338361Z" level=info msg="Start cni network conf syncer for default" May 15 10:18:37.120353 env[1221]: time="2025-05-15T10:18:37.120345898Z" level=info msg="Start streaming server" May 15 10:18:37.120484 env[1221]: time="2025-05-15T10:18:37.120405254Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:18:37.120528 env[1221]: time="2025-05-15T10:18:37.120513274Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:18:37.120578 env[1221]: time="2025-05-15T10:18:37.120563618Z" level=info msg="containerd successfully booted in 0.037509s" May 15 10:18:37.120724 systemd[1]: Started containerd.service. May 15 10:18:37.179998 locksmithd[1250]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:18:37.330160 systemd-networkd[1047]: eth0: Gained IPv6LL May 15 10:18:37.332076 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:18:37.333354 systemd[1]: Reached target network-online.target. May 15 10:18:37.335795 systemd[1]: Starting kubelet.service... May 15 10:18:37.437537 tar[1217]: linux-arm64/README.md May 15 10:18:37.441876 systemd[1]: Finished prepare-helm.service. May 15 10:18:37.924699 systemd[1]: Started kubelet.service. May 15 10:18:38.434358 sshd_keygen[1218]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:18:38.453693 kubelet[1262]: E0515 10:18:38.453643 1262 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:18:38.454611 systemd[1]: Finished sshd-keygen.service. May 15 10:18:38.456868 systemd[1]: Starting issuegen.service... May 15 10:18:38.457711 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:18:38.457853 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:18:38.462252 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:18:38.462399 systemd[1]: Finished issuegen.service. May 15 10:18:38.464582 systemd[1]: Starting systemd-user-sessions.service... May 15 10:18:38.470554 systemd[1]: Finished systemd-user-sessions.service. May 15 10:18:38.472953 systemd[1]: Started getty@tty1.service. May 15 10:18:38.474934 systemd[1]: Started serial-getty@ttyAMA0.service. May 15 10:18:38.475886 systemd[1]: Reached target getty.target. May 15 10:18:38.476600 systemd[1]: Reached target multi-user.target. May 15 10:18:38.478512 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:18:38.485199 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:18:38.485376 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:18:38.486206 systemd[1]: Startup finished in 594ms (kernel) + 4.115s (initrd) + 4.797s (userspace) = 9.507s. May 15 10:18:41.902700 systemd[1]: Created slice system-sshd.slice. May 15 10:18:41.903814 systemd[1]: Started sshd@0-10.0.0.84:22-10.0.0.1:60520.service. May 15 10:18:41.969908 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 60520 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:18:41.972454 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:18:41.983879 systemd-logind[1207]: New session 1 of user core. May 15 10:18:41.984843 systemd[1]: Created slice user-500.slice. May 15 10:18:41.985974 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:18:41.995584 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:18:41.996952 systemd[1]: Starting user@500.service... May 15 10:18:42.000854 (systemd)[1287]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:18:42.070417 systemd[1287]: Queued start job for default target default.target. May 15 10:18:42.070905 systemd[1287]: Reached target paths.target. May 15 10:18:42.070938 systemd[1287]: Reached target sockets.target. May 15 10:18:42.070949 systemd[1287]: Reached target timers.target. May 15 10:18:42.070959 systemd[1287]: Reached target basic.target. May 15 10:18:42.071063 systemd[1287]: Reached target default.target. May 15 10:18:42.071161 systemd[1]: Started user@500.service. May 15 10:18:42.071713 systemd[1287]: Startup finished in 63ms. May 15 10:18:42.072089 systemd[1]: Started session-1.scope. May 15 10:18:42.123546 systemd[1]: Started sshd@1-10.0.0.84:22-10.0.0.1:60534.service. May 15 10:18:42.156784 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 60534 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:18:42.158054 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:18:42.166917 systemd-logind[1207]: New session 2 of user core. May 15 10:18:42.167811 systemd[1]: Started session-2.scope. May 15 10:18:42.225894 sshd[1296]: pam_unix(sshd:session): session closed for user core May 15 10:18:42.228562 systemd[1]: Started sshd@2-10.0.0.84:22-10.0.0.1:60548.service. May 15 10:18:42.229131 systemd[1]: sshd@1-10.0.0.84:22-10.0.0.1:60534.service: Deactivated successfully. May 15 10:18:42.229881 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:18:42.230391 systemd-logind[1207]: Session 2 logged out. Waiting for processes to exit. May 15 10:18:42.231082 systemd-logind[1207]: Removed session 2. May 15 10:18:42.260397 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 60548 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:18:42.261659 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:18:42.265056 systemd-logind[1207]: New session 3 of user core. May 15 10:18:42.265939 systemd[1]: Started session-3.scope. May 15 10:18:42.317620 sshd[1301]: pam_unix(sshd:session): session closed for user core May 15 10:18:42.320434 systemd[1]: sshd@2-10.0.0.84:22-10.0.0.1:60548.service: Deactivated successfully. May 15 10:18:42.321084 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:18:42.321559 systemd-logind[1207]: Session 3 logged out. Waiting for processes to exit. May 15 10:18:42.322597 systemd[1]: Started sshd@3-10.0.0.84:22-10.0.0.1:60554.service. May 15 10:18:42.323234 systemd-logind[1207]: Removed session 3. May 15 10:18:42.354757 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 60554 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:18:42.356019 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:18:42.359685 systemd-logind[1207]: New session 4 of user core. May 15 10:18:42.360127 systemd[1]: Started session-4.scope. May 15 10:18:42.415006 sshd[1308]: pam_unix(sshd:session): session closed for user core May 15 10:18:42.418947 systemd[1]: sshd@3-10.0.0.84:22-10.0.0.1:60554.service: Deactivated successfully. May 15 10:18:42.419681 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:18:42.420191 systemd-logind[1207]: Session 4 logged out. Waiting for processes to exit. May 15 10:18:42.421248 systemd[1]: Started sshd@4-10.0.0.84:22-10.0.0.1:52698.service. May 15 10:18:42.421909 systemd-logind[1207]: Removed session 4. May 15 10:18:42.454339 sshd[1315]: Accepted publickey for core from 10.0.0.1 port 52698 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:18:42.455718 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:18:42.459385 systemd-logind[1207]: New session 5 of user core. May 15 10:18:42.460240 systemd[1]: Started session-5.scope. May 15 10:18:42.524121 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:18:42.524719 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:18:42.534204 dbus-daemon[1195]: avc: received setenforce notice (enforcing=1) May 15 10:18:42.536036 sudo[1318]: pam_unix(sudo:session): session closed for user root May 15 10:18:42.538629 sshd[1315]: pam_unix(sshd:session): session closed for user core May 15 10:18:42.543451 systemd[1]: sshd@4-10.0.0.84:22-10.0.0.1:52698.service: Deactivated successfully. May 15 10:18:42.544159 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:18:42.544914 systemd-logind[1207]: Session 5 logged out. Waiting for processes to exit. May 15 10:18:42.546136 systemd[1]: Started sshd@5-10.0.0.84:22-10.0.0.1:52702.service. May 15 10:18:42.546881 systemd-logind[1207]: Removed session 5. May 15 10:18:42.579864 sshd[1322]: Accepted publickey for core from 10.0.0.1 port 52702 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:18:42.581320 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:18:42.585091 systemd-logind[1207]: New session 6 of user core. May 15 10:18:42.585848 systemd[1]: Started session-6.scope. May 15 10:18:42.638361 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:18:42.638581 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:18:42.641273 sudo[1326]: pam_unix(sudo:session): session closed for user root May 15 10:18:42.645723 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:18:42.645956 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:18:42.654549 systemd[1]: Stopping audit-rules.service... May 15 10:18:42.654000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:18:42.655897 auditctl[1329]: No rules May 15 10:18:42.656169 kernel: kauditd_printk_skb: 111 callbacks suppressed May 15 10:18:42.656222 kernel: audit: type=1305 audit(1747304322.654:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:18:42.656320 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:18:42.656480 systemd[1]: Stopped audit-rules.service. May 15 10:18:42.654000 audit[1329]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff4b2f620 a2=420 a3=0 items=0 ppid=1 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:42.657951 systemd[1]: Starting audit-rules.service... May 15 10:18:42.660104 kernel: audit: type=1300 audit(1747304322.654:199): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff4b2f620 a2=420 a3=0 items=0 ppid=1 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:42.660149 kernel: audit: type=1327 audit(1747304322.654:199): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:18:42.654000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:18:42.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:42.663206 kernel: audit: type=1131 audit(1747304322.655:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:42.674129 augenrules[1346]: No rules May 15 10:18:42.675457 systemd[1]: Finished audit-rules.service. May 15 10:18:42.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:42.676873 sudo[1325]: pam_unix(sudo:session): session closed for user root May 15 10:18:42.675000 audit[1325]: USER_END pid=1325 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:18:42.678814 sshd[1322]: pam_unix(sshd:session): session closed for user core May 15 10:18:42.680299 kernel: audit: type=1130 audit(1747304322.674:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:42.680356 kernel: audit: type=1106 audit(1747304322.675:202): pid=1325 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:18:42.680373 kernel: audit: type=1104 audit(1747304322.676:203): pid=1325 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:18:42.676000 audit[1325]: CRED_DISP pid=1325 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:18:42.682063 systemd[1]: Started sshd@6-10.0.0.84:22-10.0.0.1:52704.service. May 15 10:18:42.682247 kernel: audit: type=1106 audit(1747304322.678:204): pid=1322 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:18:42.678000 audit[1322]: USER_END pid=1322 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:18:42.682681 systemd[1]: sshd@5-10.0.0.84:22-10.0.0.1:52702.service: Deactivated successfully. May 15 10:18:42.683458 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:18:42.684027 systemd-logind[1207]: Session 6 logged out. Waiting for processes to exit. May 15 10:18:42.678000 audit[1322]: CRED_DISP pid=1322 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:18:42.685338 systemd-logind[1207]: Removed session 6. May 15 10:18:42.687224 kernel: audit: type=1104 audit(1747304322.678:205): pid=1322 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:18:42.687278 kernel: audit: type=1130 audit(1747304322.681:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:52704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:42.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:52704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:42.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.84:22-10.0.0.1:52702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:42.713000 audit[1351]: USER_ACCT pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:18:42.714852 sshd[1351]: Accepted publickey for core from 10.0.0.1 port 52704 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:18:42.715000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:18:42.715000 audit[1351]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb913b40 a2=3 a3=1 items=0 ppid=1 pid=1351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:42.715000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:18:42.716408 sshd[1351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:18:42.720037 systemd-logind[1207]: New session 7 of user core. May 15 10:18:42.720524 systemd[1]: Started session-7.scope. May 15 10:18:42.722000 audit[1351]: USER_START pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:18:42.723000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:18:42.771000 audit[1356]: USER_ACCT pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:18:42.772751 sudo[1356]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:18:42.771000 audit[1356]: CRED_REFR pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:18:42.772979 sudo[1356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:18:42.773000 audit[1356]: USER_START pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:18:42.832438 systemd[1]: Starting docker.service... May 15 10:18:42.915326 env[1368]: time="2025-05-15T10:18:42.915274722Z" level=info msg="Starting up" May 15 10:18:42.916823 env[1368]: time="2025-05-15T10:18:42.916795355Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:18:42.916921 env[1368]: time="2025-05-15T10:18:42.916907564Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:18:42.917033 env[1368]: time="2025-05-15T10:18:42.917014023Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:18:42.917091 env[1368]: time="2025-05-15T10:18:42.917078125Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:18:42.919636 env[1368]: time="2025-05-15T10:18:42.919612729Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:18:42.919718 env[1368]: time="2025-05-15T10:18:42.919704326Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:18:42.919773 env[1368]: time="2025-05-15T10:18:42.919759722Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:18:42.919822 env[1368]: time="2025-05-15T10:18:42.919810947Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:18:43.055604 env[1368]: time="2025-05-15T10:18:43.055505055Z" level=info msg="Loading containers: start." May 15 10:18:43.109000 audit[1402]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.109000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd191ba20 a2=0 a3=1 items=0 ppid=1368 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:18:43.112000 audit[1404]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.112000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc179b030 a2=0 a3=1 items=0 ppid=1368 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:18:43.114000 audit[1406]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.114000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe286f120 a2=0 a3=1 items=0 ppid=1368 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.114000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:18:43.116000 audit[1408]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.116000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffcfac3830 a2=0 a3=1 items=0 ppid=1368 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:18:43.119000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.119000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc08ee400 a2=0 a3=1 items=0 ppid=1368 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.119000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:18:43.141000 audit[1415]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.141000 audit[1415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd24a43a0 a2=0 a3=1 items=0 ppid=1368 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.141000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:18:43.148000 audit[1417]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.148000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe8e8b6b0 a2=0 a3=1 items=0 ppid=1368 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.148000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:18:43.149000 audit[1419]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.149000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffcd30ce90 a2=0 a3=1 items=0 ppid=1368 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.149000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:18:43.150000 audit[1421]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.150000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffffb4b53f0 a2=0 a3=1 items=0 ppid=1368 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.150000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:18:43.158000 audit[1425]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.158000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdca7fa30 a2=0 a3=1 items=0 ppid=1368 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:18:43.165000 audit[1426]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.165000 audit[1426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffeccd1070 a2=0 a3=1 items=0 ppid=1368 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.165000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:18:43.178011 kernel: Initializing XFRM netlink socket May 15 10:18:43.201687 env[1368]: time="2025-05-15T10:18:43.201636929Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:18:43.218000 audit[1434]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.218000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffea8813c0 a2=0 a3=1 items=0 ppid=1368 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.218000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:18:43.233000 audit[1437]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.233000 audit[1437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc07ffc50 a2=0 a3=1 items=0 ppid=1368 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:18:43.236000 audit[1440]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.236000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffffb997bb0 a2=0 a3=1 items=0 ppid=1368 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:18:43.238000 audit[1442]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.238000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff7795800 a2=0 a3=1 items=0 ppid=1368 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.238000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:18:43.240000 audit[1444]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.240000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc198aa50 a2=0 a3=1 items=0 ppid=1368 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.240000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:18:43.242000 audit[1446]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.242000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffefdea650 a2=0 a3=1 items=0 ppid=1368 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.242000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:18:43.244000 audit[1448]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.244000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffddecfcf0 a2=0 a3=1 items=0 ppid=1368 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:18:43.254000 audit[1451]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.254000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffea9cfba0 a2=0 a3=1 items=0 ppid=1368 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.254000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:18:43.256000 audit[1453]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.256000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd8069790 a2=0 a3=1 items=0 ppid=1368 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.256000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:18:43.258000 audit[1455]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.258000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc744b400 a2=0 a3=1 items=0 ppid=1368 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.258000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:18:43.260000 audit[1457]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.260000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff1ea1030 a2=0 a3=1 items=0 ppid=1368 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.260000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:18:43.261909 systemd-networkd[1047]: docker0: Link UP May 15 10:18:43.268000 audit[1461]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.268000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffee908450 a2=0 a3=1 items=0 ppid=1368 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.268000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:18:43.277000 audit[1462]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:18:43.277000 audit[1462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe119bd80 a2=0 a3=1 items=0 ppid=1368 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:18:43.277000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:18:43.279232 env[1368]: time="2025-05-15T10:18:43.279192186Z" level=info msg="Loading containers: done." May 15 10:18:43.295165 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck842398909-merged.mount: Deactivated successfully. May 15 10:18:43.300671 env[1368]: time="2025-05-15T10:18:43.300622882Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:18:43.300850 env[1368]: time="2025-05-15T10:18:43.300802038Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:18:43.300926 env[1368]: time="2025-05-15T10:18:43.300897539Z" level=info msg="Daemon has completed initialization" May 15 10:18:43.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:43.313948 systemd[1]: Started docker.service. May 15 10:18:43.321147 env[1368]: time="2025-05-15T10:18:43.321032299Z" level=info msg="API listen on /run/docker.sock" May 15 10:18:43.920031 env[1221]: time="2025-05-15T10:18:43.919948278Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 15 10:18:44.830267 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount696555865.mount: Deactivated successfully. May 15 10:18:46.002687 env[1221]: time="2025-05-15T10:18:46.002625825Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:46.005911 env[1221]: time="2025-05-15T10:18:46.005873167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab579d62aa850c7d0eca948aad11fcf813743e3b6c9742241c32cb4f1638968b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:46.007584 env[1221]: time="2025-05-15T10:18:46.007557313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:46.009326 env[1221]: time="2025-05-15T10:18:46.009301249Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:46.010175 env[1221]: time="2025-05-15T10:18:46.010144752Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:ab579d62aa850c7d0eca948aad11fcf813743e3b6c9742241c32cb4f1638968b\"" May 15 10:18:46.010819 env[1221]: time="2025-05-15T10:18:46.010773028Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 15 10:18:47.355503 env[1221]: time="2025-05-15T10:18:47.355459239Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:47.358829 env[1221]: time="2025-05-15T10:18:47.358791577Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79534fade29d07745acc698bbf598b0604a9ea1fd7917822c816a74fc0b55965,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:47.360738 env[1221]: time="2025-05-15T10:18:47.360706955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:47.363235 env[1221]: time="2025-05-15T10:18:47.363198842Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:47.364022 env[1221]: time="2025-05-15T10:18:47.363972512Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:79534fade29d07745acc698bbf598b0604a9ea1fd7917822c816a74fc0b55965\"" May 15 10:18:47.364774 env[1221]: time="2025-05-15T10:18:47.364746062Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 15 10:18:48.468250 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 10:18:48.468356 kernel: audit: type=1130 audit(1747304328.459:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:48.468381 kernel: audit: type=1131 audit(1747304328.459:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:48.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:48.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:48.460659 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:18:48.460846 systemd[1]: Stopped kubelet.service. May 15 10:18:48.462330 systemd[1]: Starting kubelet.service... May 15 10:18:48.554376 systemd[1]: Started kubelet.service. May 15 10:18:48.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:48.557002 kernel: audit: type=1130 audit(1747304328.553:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:48.585270 kubelet[1503]: E0515 10:18:48.585231 1503 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:18:48.587893 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:18:48.588039 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:18:48.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:18:48.591007 kernel: audit: type=1131 audit(1747304328.587:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:18:48.686935 env[1221]: time="2025-05-15T10:18:48.686877974Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:48.688780 env[1221]: time="2025-05-15T10:18:48.688745147Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:730fbc2590716b8202fcdd928a813b847575ebf03911a059979257cd6cbb8245,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:48.690649 env[1221]: time="2025-05-15T10:18:48.690611677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:48.692293 env[1221]: time="2025-05-15T10:18:48.692263905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:48.693156 env[1221]: time="2025-05-15T10:18:48.693126500Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:730fbc2590716b8202fcdd928a813b847575ebf03911a059979257cd6cbb8245\"" May 15 10:18:48.693916 env[1221]: time="2025-05-15T10:18:48.693732240Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 15 10:18:49.711851 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount389343.mount: Deactivated successfully. May 15 10:18:50.175161 env[1221]: time="2025-05-15T10:18:50.175045170Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:50.176889 env[1221]: time="2025-05-15T10:18:50.176851605Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:50.178082 env[1221]: time="2025-05-15T10:18:50.178055974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:50.179269 env[1221]: time="2025-05-15T10:18:50.179235760Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:50.179645 env[1221]: time="2025-05-15T10:18:50.179611227Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7\"" May 15 10:18:50.180130 env[1221]: time="2025-05-15T10:18:50.180107444Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 15 10:18:50.698345 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3210923962.mount: Deactivated successfully. May 15 10:18:51.626103 env[1221]: time="2025-05-15T10:18:51.626055976Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:51.627587 env[1221]: time="2025-05-15T10:18:51.627556768Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:51.630214 env[1221]: time="2025-05-15T10:18:51.630176421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:51.632158 env[1221]: time="2025-05-15T10:18:51.632131574Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:51.633027 env[1221]: time="2025-05-15T10:18:51.632996615Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" May 15 10:18:51.633547 env[1221]: time="2025-05-15T10:18:51.633518345Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 10:18:52.073300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2323771006.mount: Deactivated successfully. May 15 10:18:52.077853 env[1221]: time="2025-05-15T10:18:52.077644879Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:52.079325 env[1221]: time="2025-05-15T10:18:52.079281380Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:52.080582 env[1221]: time="2025-05-15T10:18:52.080549567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:52.085811 env[1221]: time="2025-05-15T10:18:52.085766303Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:52.086481 env[1221]: time="2025-05-15T10:18:52.086437156Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 15 10:18:52.087141 env[1221]: time="2025-05-15T10:18:52.087113346Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 15 10:18:52.550427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount898152239.mount: Deactivated successfully. May 15 10:18:54.418364 env[1221]: time="2025-05-15T10:18:54.418316085Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:54.421032 env[1221]: time="2025-05-15T10:18:54.420994051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:54.423630 env[1221]: time="2025-05-15T10:18:54.423580790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:54.431171 env[1221]: time="2025-05-15T10:18:54.431116531Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:18:54.432314 env[1221]: time="2025-05-15T10:18:54.432279016Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82\"" May 15 10:18:58.710875 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:18:58.711092 systemd[1]: Stopped kubelet.service. May 15 10:18:58.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:58.712510 systemd[1]: Starting kubelet.service... May 15 10:18:58.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:58.716820 kernel: audit: type=1130 audit(1747304338.710:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:58.716868 kernel: audit: type=1131 audit(1747304338.710:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:58.817688 systemd[1]: Started kubelet.service. May 15 10:18:58.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:58.821047 kernel: audit: type=1130 audit(1747304338.817:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:58.856991 kubelet[1535]: E0515 10:18:58.856920 1535 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:18:58.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:18:58.859027 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:18:58.859149 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:18:58.863104 kernel: audit: type=1131 audit(1747304338.858:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:18:59.798425 systemd[1]: Stopped kubelet.service. May 15 10:18:59.802707 kernel: audit: type=1130 audit(1747304339.798:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:59.802795 kernel: audit: type=1131 audit(1747304339.798:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:59.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:59.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:18:59.802070 systemd[1]: Starting kubelet.service... May 15 10:18:59.824364 systemd[1]: Reloading. May 15 10:18:59.880010 /usr/lib/systemd/system-generators/torcx-generator[1570]: time="2025-05-15T10:18:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:18:59.880356 /usr/lib/systemd/system-generators/torcx-generator[1570]: time="2025-05-15T10:18:59Z" level=info msg="torcx already run" May 15 10:18:59.970706 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:18:59.970725 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:18:59.986060 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:19:00.042355 kernel: audit: type=1400 audit(1747304340.034:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042448 kernel: audit: type=1400 audit(1747304340.034:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042477 kernel: audit: type=1400 audit(1747304340.034:253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042495 kernel: audit: type=1400 audit(1747304340.034:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit: BPF prog-id=43 op=LOAD May 15 10:19:00.036000 audit: BPF prog-id=27 op=UNLOAD May 15 10:19:00.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit: BPF prog-id=44 op=LOAD May 15 10:19:00.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit: BPF prog-id=45 op=LOAD May 15 10:19:00.039000 audit: BPF prog-id=28 op=UNLOAD May 15 10:19:00.039000 audit: BPF prog-id=29 op=UNLOAD May 15 10:19:00.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit: BPF prog-id=46 op=LOAD May 15 10:19:00.041000 audit: BPF prog-id=41 op=UNLOAD May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit: BPF prog-id=47 op=LOAD May 15 10:19:00.041000 audit: BPF prog-id=30 op=UNLOAD May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit: BPF prog-id=48 op=LOAD May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.041000 audit: BPF prog-id=49 op=LOAD May 15 10:19:00.041000 audit: BPF prog-id=31 op=UNLOAD May 15 10:19:00.041000 audit: BPF prog-id=32 op=UNLOAD May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit: BPF prog-id=50 op=LOAD May 15 10:19:00.042000 audit: BPF prog-id=38 op=UNLOAD May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit: BPF prog-id=51 op=LOAD May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit: BPF prog-id=53 op=LOAD May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit: BPF prog-id=54 op=LOAD May 15 10:19:00.043000 audit: BPF prog-id=33 op=UNLOAD May 15 10:19:00.043000 audit: BPF prog-id=34 op=UNLOAD May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.043000 audit: BPF prog-id=55 op=LOAD May 15 10:19:00.043000 audit: BPF prog-id=36 op=UNLOAD May 15 10:19:00.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.044000 audit: BPF prog-id=56 op=LOAD May 15 10:19:00.044000 audit: BPF prog-id=37 op=UNLOAD May 15 10:19:00.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.045000 audit: BPF prog-id=57 op=LOAD May 15 10:19:00.045000 audit: BPF prog-id=35 op=UNLOAD May 15 10:19:00.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:00.057567 systemd[1]: Started kubelet.service. May 15 10:19:00.061089 systemd[1]: Stopping kubelet.service... May 15 10:19:00.061771 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:19:00.062100 systemd[1]: Stopped kubelet.service. May 15 10:19:00.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:00.063910 systemd[1]: Starting kubelet.service... May 15 10:19:00.151033 systemd[1]: Started kubelet.service. May 15 10:19:00.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:00.188312 kubelet[1618]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:19:00.188312 kubelet[1618]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 10:19:00.188312 kubelet[1618]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:19:00.188658 kubelet[1618]: I0515 10:19:00.188378 1618 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:19:00.886707 kubelet[1618]: I0515 10:19:00.886652 1618 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 10:19:00.886707 kubelet[1618]: I0515 10:19:00.886691 1618 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:19:00.886977 kubelet[1618]: I0515 10:19:00.886949 1618 server.go:954] "Client rotation is on, will bootstrap in background" May 15 10:19:00.944230 kubelet[1618]: E0515 10:19:00.944187 1618 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.84:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.84:6443: connect: connection refused" logger="UnhandledError" May 15 10:19:00.945119 kubelet[1618]: I0515 10:19:00.945097 1618 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:19:00.955376 kubelet[1618]: E0515 10:19:00.955337 1618 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:19:00.955376 kubelet[1618]: I0515 10:19:00.955371 1618 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:19:00.958018 kubelet[1618]: I0515 10:19:00.957995 1618 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:19:00.958741 kubelet[1618]: I0515 10:19:00.958697 1618 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:19:00.958892 kubelet[1618]: I0515 10:19:00.958737 1618 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:19:00.958969 kubelet[1618]: I0515 10:19:00.958963 1618 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:19:00.959015 kubelet[1618]: I0515 10:19:00.958990 1618 container_manager_linux.go:304] "Creating device plugin manager" May 15 10:19:00.959196 kubelet[1618]: I0515 10:19:00.959181 1618 state_mem.go:36] "Initialized new in-memory state store" May 15 10:19:00.961733 kubelet[1618]: I0515 10:19:00.961709 1618 kubelet.go:446] "Attempting to sync node with API server" May 15 10:19:00.961733 kubelet[1618]: I0515 10:19:00.961731 1618 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:19:00.961802 kubelet[1618]: I0515 10:19:00.961751 1618 kubelet.go:352] "Adding apiserver pod source" May 15 10:19:00.961802 kubelet[1618]: I0515 10:19:00.961760 1618 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:19:00.972405 kubelet[1618]: I0515 10:19:00.972377 1618 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:19:00.972984 kubelet[1618]: W0515 10:19:00.972932 1618 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.84:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused May 15 10:19:00.973036 kubelet[1618]: E0515 10:19:00.973005 1618 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.84:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.84:6443: connect: connection refused" logger="UnhandledError" May 15 10:19:00.973157 kubelet[1618]: I0515 10:19:00.973140 1618 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:19:00.973296 kubelet[1618]: W0515 10:19:00.973285 1618 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:19:00.973445 kubelet[1618]: W0515 10:19:00.973411 1618 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.84:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused May 15 10:19:00.973479 kubelet[1618]: E0515 10:19:00.973457 1618 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.84:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.84:6443: connect: connection refused" logger="UnhandledError" May 15 10:19:00.974331 kubelet[1618]: I0515 10:19:00.974314 1618 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 10:19:00.974373 kubelet[1618]: I0515 10:19:00.974353 1618 server.go:1287] "Started kubelet" May 15 10:19:00.974472 kubelet[1618]: I0515 10:19:00.974438 1618 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:19:00.975544 kubelet[1618]: I0515 10:19:00.975523 1618 server.go:490] "Adding debug handlers to kubelet server" May 15 10:19:00.982033 kubelet[1618]: I0515 10:19:00.981996 1618 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:19:00.982173 kubelet[1618]: I0515 10:19:00.982155 1618 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 10:19:00.982304 kubelet[1618]: I0515 10:19:00.982290 1618 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:19:00.980000 audit[1618]: AVC avc: denied { mac_admin } for pid=1618 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.980000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:00.980000 audit[1618]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ae92c0 a1=4000678b28 a2=4000ae9290 a3=25 items=0 ppid=1 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:00.980000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:00.981000 audit[1618]: AVC avc: denied { mac_admin } for pid=1618 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:00.981000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:00.981000 audit[1618]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40003a8240 a1=4000678b40 a2=4000ae9350 a3=25 items=0 ppid=1 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:00.981000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:00.984000 audit[1631]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:00.984000 audit[1631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc99dca20 a2=0 a3=1 items=0 ppid=1618 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:00.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:19:00.985000 audit[1632]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:00.985000 audit[1632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd07a260 a2=0 a3=1 items=0 ppid=1618 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:00.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:19:00.988251 kubelet[1618]: I0515 10:19:00.988223 1618 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:19:00.989493 kubelet[1618]: I0515 10:19:00.989476 1618 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 10:19:00.990045 kubelet[1618]: E0515 10:19:00.990011 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:00.990000 audit[1634]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:00.990000 audit[1634]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcc7e9900 a2=0 a3=1 items=0 ppid=1618 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:00.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:19:00.991545 kubelet[1618]: I0515 10:19:00.991464 1618 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:19:00.991704 kubelet[1618]: I0515 10:19:00.991678 1618 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:19:00.993483 kubelet[1618]: I0515 10:19:00.993459 1618 factory.go:221] Registration of the systemd container factory successfully May 15 10:19:00.993562 kubelet[1618]: I0515 10:19:00.993552 1618 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:19:00.994099 kubelet[1618]: E0515 10:19:00.993271 1618 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.84:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.84:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fac0a5e45e6aa default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:19:00.974331562 +0000 UTC m=+0.819863926,LastTimestamp:2025-05-15 10:19:00.974331562 +0000 UTC m=+0.819863926,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:19:00.994207 kubelet[1618]: E0515 10:19:00.994183 1618 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.84:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.84:6443: connect: connection refused" interval="200ms" May 15 10:19:00.994412 kubelet[1618]: I0515 10:19:00.994356 1618 reconciler.go:26] "Reconciler: start to sync state" May 15 10:19:00.994622 kubelet[1618]: I0515 10:19:00.994607 1618 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:19:00.994737 kubelet[1618]: I0515 10:19:00.994716 1618 factory.go:221] Registration of the containerd container factory successfully May 15 10:19:00.994797 kubelet[1618]: E0515 10:19:00.994778 1618 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:19:00.994933 kubelet[1618]: W0515 10:19:00.994892 1618 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.84:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused May 15 10:19:00.994966 kubelet[1618]: E0515 10:19:00.994947 1618 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.84:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.84:6443: connect: connection refused" logger="UnhandledError" May 15 10:19:00.997000 audit[1638]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:00.997000 audit[1638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffce7e2450 a2=0 a3=1 items=0 ppid=1618 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:00.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:19:01.008901 kubelet[1618]: I0515 10:19:01.008867 1618 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 10:19:01.008901 kubelet[1618]: I0515 10:19:01.008885 1618 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 10:19:01.008901 kubelet[1618]: I0515 10:19:01.008904 1618 state_mem.go:36] "Initialized new in-memory state store" May 15 10:19:01.009000 audit[1644]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:01.009000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffef82e440 a2=0 a3=1 items=0 ppid=1618 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:19:01.010280 kubelet[1618]: I0515 10:19:01.010245 1618 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:19:01.010000 audit[1647]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:01.010000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6698c20 a2=0 a3=1 items=0 ppid=1618 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:19:01.010000 audit[1646]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:01.010000 audit[1646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc525b5e0 a2=0 a3=1 items=0 ppid=1618 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:19:01.011873 kubelet[1618]: I0515 10:19:01.011830 1618 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:19:01.011873 kubelet[1618]: I0515 10:19:01.011865 1618 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 10:19:01.011955 kubelet[1618]: I0515 10:19:01.011885 1618 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 10:19:01.011955 kubelet[1618]: I0515 10:19:01.011892 1618 kubelet.go:2388] "Starting kubelet main sync loop" May 15 10:19:01.011955 kubelet[1618]: E0515 10:19:01.011936 1618 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:19:01.012491 kubelet[1618]: W0515 10:19:01.012441 1618 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.84:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused May 15 10:19:01.012559 kubelet[1618]: E0515 10:19:01.012489 1618 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.84:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.84:6443: connect: connection refused" logger="UnhandledError" May 15 10:19:01.011000 audit[1649]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:01.011000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff062c3e0 a2=0 a3=1 items=0 ppid=1618 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:19:01.012000 audit[1648]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:01.012000 audit[1648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffdc446c0 a2=0 a3=1 items=0 ppid=1618 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:19:01.013000 audit[1650]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:01.013000 audit[1650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff6863e90 a2=0 a3=1 items=0 ppid=1618 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:19:01.013000 audit[1651]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:01.013000 audit[1651]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff92af2c0 a2=0 a3=1 items=0 ppid=1618 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:19:01.014000 audit[1652]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:01.014000 audit[1652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc72ccbf0 a2=0 a3=1 items=0 ppid=1618 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:19:01.075669 kubelet[1618]: I0515 10:19:01.075628 1618 policy_none.go:49] "None policy: Start" May 15 10:19:01.075669 kubelet[1618]: I0515 10:19:01.075661 1618 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 10:19:01.075669 kubelet[1618]: I0515 10:19:01.075674 1618 state_mem.go:35] "Initializing new in-memory state store" May 15 10:19:01.080686 systemd[1]: Created slice kubepods.slice. May 15 10:19:01.085087 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:19:01.087555 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:19:01.090224 kubelet[1618]: E0515 10:19:01.090188 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:01.096763 kubelet[1618]: I0515 10:19:01.096723 1618 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:19:01.095000 audit[1618]: AVC avc: denied { mac_admin } for pid=1618 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:01.095000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:01.095000 audit[1618]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007e3020 a1=4000ca42a0 a2=40007e2ff0 a3=25 items=0 ppid=1 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:01.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:01.097013 kubelet[1618]: I0515 10:19:01.096801 1618 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:19:01.097013 kubelet[1618]: I0515 10:19:01.096922 1618 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:19:01.097013 kubelet[1618]: I0515 10:19:01.096936 1618 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:19:01.097252 kubelet[1618]: I0515 10:19:01.097174 1618 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:19:01.098662 kubelet[1618]: E0515 10:19:01.098407 1618 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 10:19:01.098662 kubelet[1618]: E0515 10:19:01.098459 1618 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:19:01.120171 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 15 10:19:01.135906 kubelet[1618]: E0515 10:19:01.135868 1618 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:19:01.138408 systemd[1]: Created slice kubepods-burstable-pod8dde0f06162a6075e0d81f44c9d9f06d.slice. May 15 10:19:01.141990 kubelet[1618]: E0515 10:19:01.141704 1618 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:19:01.143116 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 15 10:19:01.144430 kubelet[1618]: E0515 10:19:01.144408 1618 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:19:01.194533 kubelet[1618]: E0515 10:19:01.194497 1618 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.84:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.84:6443: connect: connection refused" interval="400ms" May 15 10:19:01.196433 kubelet[1618]: I0515 10:19:01.196399 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8dde0f06162a6075e0d81f44c9d9f06d-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"8dde0f06162a6075e0d81f44c9d9f06d\") " pod="kube-system/kube-apiserver-localhost" May 15 10:19:01.196500 kubelet[1618]: I0515 10:19:01.196438 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:01.196500 kubelet[1618]: I0515 10:19:01.196458 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:01.196500 kubelet[1618]: I0515 10:19:01.196474 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:01.196500 kubelet[1618]: I0515 10:19:01.196493 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 15 10:19:01.196600 kubelet[1618]: I0515 10:19:01.196521 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8dde0f06162a6075e0d81f44c9d9f06d-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"8dde0f06162a6075e0d81f44c9d9f06d\") " pod="kube-system/kube-apiserver-localhost" May 15 10:19:01.196600 kubelet[1618]: I0515 10:19:01.196537 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8dde0f06162a6075e0d81f44c9d9f06d-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"8dde0f06162a6075e0d81f44c9d9f06d\") " pod="kube-system/kube-apiserver-localhost" May 15 10:19:01.196600 kubelet[1618]: I0515 10:19:01.196552 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:01.196600 kubelet[1618]: I0515 10:19:01.196567 1618 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:01.198497 kubelet[1618]: I0515 10:19:01.198470 1618 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:19:01.199053 kubelet[1618]: E0515 10:19:01.199028 1618 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.84:6443/api/v1/nodes\": dial tcp 10.0.0.84:6443: connect: connection refused" node="localhost" May 15 10:19:01.400599 kubelet[1618]: I0515 10:19:01.400376 1618 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:19:01.401531 kubelet[1618]: E0515 10:19:01.401495 1618 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.84:6443/api/v1/nodes\": dial tcp 10.0.0.84:6443: connect: connection refused" node="localhost" May 15 10:19:01.436715 kubelet[1618]: E0515 10:19:01.436686 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:01.437384 env[1221]: time="2025-05-15T10:19:01.437342768Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 15 10:19:01.442915 kubelet[1618]: E0515 10:19:01.442581 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:01.443112 env[1221]: time="2025-05-15T10:19:01.443055664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:8dde0f06162a6075e0d81f44c9d9f06d,Namespace:kube-system,Attempt:0,}" May 15 10:19:01.446197 kubelet[1618]: E0515 10:19:01.446177 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:01.446754 env[1221]: time="2025-05-15T10:19:01.446683845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 15 10:19:01.596302 kubelet[1618]: E0515 10:19:01.596263 1618 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.84:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.84:6443: connect: connection refused" interval="800ms" May 15 10:19:01.803517 kubelet[1618]: I0515 10:19:01.803476 1618 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:19:01.803859 kubelet[1618]: E0515 10:19:01.803832 1618 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.84:6443/api/v1/nodes\": dial tcp 10.0.0.84:6443: connect: connection refused" node="localhost" May 15 10:19:01.832400 kubelet[1618]: W0515 10:19:01.832342 1618 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.84:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused May 15 10:19:01.832568 kubelet[1618]: E0515 10:19:01.832550 1618 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.84:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.84:6443: connect: connection refused" logger="UnhandledError" May 15 10:19:01.958829 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2960935118.mount: Deactivated successfully. May 15 10:19:01.967256 env[1221]: time="2025-05-15T10:19:01.967205830Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.968485 env[1221]: time="2025-05-15T10:19:01.968453328Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.969509 env[1221]: time="2025-05-15T10:19:01.969358611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.972484 env[1221]: time="2025-05-15T10:19:01.971466468Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.973268 env[1221]: time="2025-05-15T10:19:01.973223103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.974148 env[1221]: time="2025-05-15T10:19:01.974114453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.975166 env[1221]: time="2025-05-15T10:19:01.974940059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.977857 env[1221]: time="2025-05-15T10:19:01.977812102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.981325 env[1221]: time="2025-05-15T10:19:01.981238566Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.984149 env[1221]: time="2025-05-15T10:19:01.984089909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.984917 env[1221]: time="2025-05-15T10:19:01.984854015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:01.987222 env[1221]: time="2025-05-15T10:19:01.987177082Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:02.038803 env[1221]: time="2025-05-15T10:19:02.038728926Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:02.038803 env[1221]: time="2025-05-15T10:19:02.038769601Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:02.039084 env[1221]: time="2025-05-15T10:19:02.039018774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:02.039366 env[1221]: time="2025-05-15T10:19:02.039328799Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55396d85bfe7b042ccab4a5bb071a63a36551ed80a06045160d33c4e00736235 pid=1673 runtime=io.containerd.runc.v2 May 15 10:19:02.040584 env[1221]: time="2025-05-15T10:19:02.040518495Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:02.040584 env[1221]: time="2025-05-15T10:19:02.040548801Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:02.040584 env[1221]: time="2025-05-15T10:19:02.040560531Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:02.040991 env[1221]: time="2025-05-15T10:19:02.040803739Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:02.040991 env[1221]: time="2025-05-15T10:19:02.040838809Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:02.040991 env[1221]: time="2025-05-15T10:19:02.040849137Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:02.041087 env[1221]: time="2025-05-15T10:19:02.040935091Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd5a6ff0d42a17bb3ce200088e99b91052ed19d859dc374b2e10b9bdd5f985c4 pid=1674 runtime=io.containerd.runc.v2 May 15 10:19:02.041168 env[1221]: time="2025-05-15T10:19:02.041119608Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8b2840460c1e8765862d544183d0c382f84eb87ccb0a92d2b53f03522eb258c2 pid=1679 runtime=io.containerd.runc.v2 May 15 10:19:02.050963 systemd[1]: Started cri-containerd-55396d85bfe7b042ccab4a5bb071a63a36551ed80a06045160d33c4e00736235.scope. May 15 10:19:02.061956 systemd[1]: Started cri-containerd-bd5a6ff0d42a17bb3ce200088e99b91052ed19d859dc374b2e10b9bdd5f985c4.scope. May 15 10:19:02.078569 systemd[1]: Started cri-containerd-8b2840460c1e8765862d544183d0c382f84eb87ccb0a92d2b53f03522eb258c2.scope. May 15 10:19:02.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.084000 audit: BPF prog-id=58 op=LOAD May 15 10:19:02.084000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.084000 audit[1694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535333936643835626665376230343263636162346135626230373161 May 15 10:19:02.084000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.084000 audit[1694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535333936643835626665376230343263636162346135626230373161 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit: BPF prog-id=59 op=LOAD May 15 10:19:02.086000 audit[1694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535333936643835626665376230343263636162346135626230373161 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.086000 audit: BPF prog-id=60 op=LOAD May 15 10:19:02.086000 audit[1694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535333936643835626665376230343263636162346135626230373161 May 15 10:19:02.087000 audit: BPF prog-id=60 op=UNLOAD May 15 10:19:02.087000 audit: BPF prog-id=59 op=UNLOAD May 15 10:19:02.087000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.087000 audit: BPF prog-id=61 op=LOAD May 15 10:19:02.087000 audit[1694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535333936643835626665376230343263636162346135626230373161 May 15 10:19:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.093000 audit: BPF prog-id=62 op=LOAD May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264356136666630643432613137626233636532303030383865393962 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264356136666630643432613137626233636532303030383865393962 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit: BPF prog-id=63 op=LOAD May 15 10:19:02.094000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264356136666630643432613137626233636532303030383865393962 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.094000 audit: BPF prog-id=64 op=LOAD May 15 10:19:02.094000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264356136666630643432613137626233636532303030383865393962 May 15 10:19:02.095000 audit: BPF prog-id=64 op=UNLOAD May 15 10:19:02.095000 audit: BPF prog-id=63 op=UNLOAD May 15 10:19:02.095000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.095000 audit: BPF prog-id=65 op=LOAD May 15 10:19:02.095000 audit[1701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264356136666630643432613137626233636532303030383865393962 May 15 10:19:02.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.097000 audit: BPF prog-id=66 op=LOAD May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1679 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323834303436306331653837363538363264353434313833643063 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1679 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323834303436306331653837363538363264353434313833643063 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit: BPF prog-id=67 op=LOAD May 15 10:19:02.098000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1679 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323834303436306331653837363538363264353434313833643063 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit: BPF prog-id=68 op=LOAD May 15 10:19:02.098000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1679 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323834303436306331653837363538363264353434313833643063 May 15 10:19:02.098000 audit: BPF prog-id=68 op=UNLOAD May 15 10:19:02.098000 audit: BPF prog-id=67 op=UNLOAD May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.098000 audit: BPF prog-id=69 op=LOAD May 15 10:19:02.098000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1679 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323834303436306331653837363538363264353434313833643063 May 15 10:19:02.116022 env[1221]: time="2025-05-15T10:19:02.115961611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"55396d85bfe7b042ccab4a5bb071a63a36551ed80a06045160d33c4e00736235\"" May 15 10:19:02.119682 kubelet[1618]: E0515 10:19:02.119657 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:02.121751 env[1221]: time="2025-05-15T10:19:02.121705276Z" level=info msg="CreateContainer within sandbox \"55396d85bfe7b042ccab4a5bb071a63a36551ed80a06045160d33c4e00736235\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:19:02.126789 env[1221]: time="2025-05-15T10:19:02.126756991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:8dde0f06162a6075e0d81f44c9d9f06d,Namespace:kube-system,Attempt:0,} returns sandbox id \"bd5a6ff0d42a17bb3ce200088e99b91052ed19d859dc374b2e10b9bdd5f985c4\"" May 15 10:19:02.128599 kubelet[1618]: E0515 10:19:02.128574 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:02.130042 env[1221]: time="2025-05-15T10:19:02.130010770Z" level=info msg="CreateContainer within sandbox \"bd5a6ff0d42a17bb3ce200088e99b91052ed19d859dc374b2e10b9bdd5f985c4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:19:02.130395 env[1221]: time="2025-05-15T10:19:02.130039995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"8b2840460c1e8765862d544183d0c382f84eb87ccb0a92d2b53f03522eb258c2\"" May 15 10:19:02.131305 kubelet[1618]: E0515 10:19:02.131276 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:02.132949 env[1221]: time="2025-05-15T10:19:02.132915731Z" level=info msg="CreateContainer within sandbox \"8b2840460c1e8765862d544183d0c382f84eb87ccb0a92d2b53f03522eb258c2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:19:02.140576 env[1221]: time="2025-05-15T10:19:02.140532397Z" level=info msg="CreateContainer within sandbox \"55396d85bfe7b042ccab4a5bb071a63a36551ed80a06045160d33c4e00736235\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f89b8998f97a5fb65317e1d3f58b44a4e829ae25e9771fd6f08ef98378871546\"" May 15 10:19:02.141079 env[1221]: time="2025-05-15T10:19:02.141050079Z" level=info msg="StartContainer for \"f89b8998f97a5fb65317e1d3f58b44a4e829ae25e9771fd6f08ef98378871546\"" May 15 10:19:02.143892 env[1221]: time="2025-05-15T10:19:02.143853033Z" level=info msg="CreateContainer within sandbox \"bd5a6ff0d42a17bb3ce200088e99b91052ed19d859dc374b2e10b9bdd5f985c4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"30be162ab126e76be7c4e2c4ee40698a98e6915a5eb1c55d623f7963f88bc56d\"" May 15 10:19:02.144540 env[1221]: time="2025-05-15T10:19:02.144511275Z" level=info msg="StartContainer for \"30be162ab126e76be7c4e2c4ee40698a98e6915a5eb1c55d623f7963f88bc56d\"" May 15 10:19:02.151266 env[1221]: time="2025-05-15T10:19:02.151212198Z" level=info msg="CreateContainer within sandbox \"8b2840460c1e8765862d544183d0c382f84eb87ccb0a92d2b53f03522eb258c2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1ea16177d72c148eac0355cb502422c7d0e45f3c75af7bf952a3a8608459e081\"" May 15 10:19:02.151741 env[1221]: time="2025-05-15T10:19:02.151711184Z" level=info msg="StartContainer for \"1ea16177d72c148eac0355cb502422c7d0e45f3c75af7bf952a3a8608459e081\"" May 15 10:19:02.157147 systemd[1]: Started cri-containerd-f89b8998f97a5fb65317e1d3f58b44a4e829ae25e9771fd6f08ef98378871546.scope. May 15 10:19:02.166235 systemd[1]: Started cri-containerd-30be162ab126e76be7c4e2c4ee40698a98e6915a5eb1c55d623f7963f88bc56d.scope. May 15 10:19:02.166581 kubelet[1618]: W0515 10:19:02.166551 1618 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.84:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused May 15 10:19:02.166654 kubelet[1618]: E0515 10:19:02.166608 1618 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.84:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.84:6443: connect: connection refused" logger="UnhandledError" May 15 10:19:02.187650 systemd[1]: Started cri-containerd-1ea16177d72c148eac0355cb502422c7d0e45f3c75af7bf952a3a8608459e081.scope. May 15 10:19:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.203000 audit: BPF prog-id=70 op=LOAD May 15 10:19:02.208000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1674 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330626531363261623132366537366265376334653263346565343036 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1674 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330626531363261623132366537366265376334653263346565343036 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.208000 audit: BPF prog-id=71 op=LOAD May 15 10:19:02.208000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1674 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330626531363261623132366537366265376334653263346565343036 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit: BPF prog-id=72 op=LOAD May 15 10:19:02.209000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1674 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330626531363261623132366537366265376334653263346565343036 May 15 10:19:02.209000 audit: BPF prog-id=72 op=UNLOAD May 15 10:19:02.209000 audit: BPF prog-id=71 op=UNLOAD May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.209000 audit: BPF prog-id=73 op=LOAD May 15 10:19:02.209000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1674 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330626531363261623132366537366265376334653263346565343036 May 15 10:19:02.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.214000 audit: BPF prog-id=74 op=LOAD May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1673 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396238393938663937613566623635333137653164336635386234 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1673 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396238393938663937613566623635333137653164336635386234 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit: BPF prog-id=75 op=LOAD May 15 10:19:02.215000 audit[1790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1673 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396238393938663937613566623635333137653164336635386234 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit: BPF prog-id=76 op=LOAD May 15 10:19:02.215000 audit[1790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1673 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396238393938663937613566623635333137653164336635386234 May 15 10:19:02.215000 audit: BPF prog-id=76 op=UNLOAD May 15 10:19:02.215000 audit: BPF prog-id=75 op=UNLOAD May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.215000 audit: BPF prog-id=77 op=LOAD May 15 10:19:02.215000 audit[1790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1673 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638396238393938663937613566623635333137653164336635386234 May 15 10:19:02.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit: BPF prog-id=78 op=LOAD May 15 10:19:02.222000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019bb38 a2=10 a3=0 items=0 ppid=1679 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613136313737643732633134386561633033353563623530323432 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019b5a0 a2=3c a3=0 items=0 ppid=1679 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613136313737643732633134386561633033353563623530323432 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.222000 audit: BPF prog-id=79 op=LOAD May 15 10:19:02.222000 audit[1824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019b8e0 a2=78 a3=0 items=0 ppid=1679 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613136313737643732633134386561633033353563623530323432 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit: BPF prog-id=80 op=LOAD May 15 10:19:02.223000 audit[1824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019b670 a2=78 a3=0 items=0 ppid=1679 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613136313737643732633134386561633033353563623530323432 May 15 10:19:02.223000 audit: BPF prog-id=80 op=UNLOAD May 15 10:19:02.223000 audit: BPF prog-id=79 op=UNLOAD May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:02.223000 audit: BPF prog-id=81 op=LOAD May 15 10:19:02.223000 audit[1824]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019bb40 a2=78 a3=0 items=0 ppid=1679 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:02.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613136313737643732633134386561633033353563623530323432 May 15 10:19:02.241183 env[1221]: time="2025-05-15T10:19:02.240985954Z" level=info msg="StartContainer for \"30be162ab126e76be7c4e2c4ee40698a98e6915a5eb1c55d623f7963f88bc56d\" returns successfully" May 15 10:19:02.271745 env[1221]: time="2025-05-15T10:19:02.268362296Z" level=info msg="StartContainer for \"1ea16177d72c148eac0355cb502422c7d0e45f3c75af7bf952a3a8608459e081\" returns successfully" May 15 10:19:02.271745 env[1221]: time="2025-05-15T10:19:02.268543771Z" level=info msg="StartContainer for \"f89b8998f97a5fb65317e1d3f58b44a4e829ae25e9771fd6f08ef98378871546\" returns successfully" May 15 10:19:02.397703 kubelet[1618]: E0515 10:19:02.397524 1618 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.84:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.84:6443: connect: connection refused" interval="1.6s" May 15 10:19:02.397703 kubelet[1618]: W0515 10:19:02.397530 1618 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.84:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.84:6443: connect: connection refused May 15 10:19:02.397703 kubelet[1618]: E0515 10:19:02.397599 1618 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.84:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.84:6443: connect: connection refused" logger="UnhandledError" May 15 10:19:02.605339 kubelet[1618]: I0515 10:19:02.605302 1618 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:19:03.017927 kubelet[1618]: E0515 10:19:03.017889 1618 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:19:03.018095 kubelet[1618]: E0515 10:19:03.018026 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:03.019883 kubelet[1618]: E0515 10:19:03.019854 1618 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:19:03.019989 kubelet[1618]: E0515 10:19:03.019959 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:03.021558 kubelet[1618]: E0515 10:19:03.021534 1618 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:19:03.021646 kubelet[1618]: E0515 10:19:03.021630 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:03.673000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:03.673000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000076180 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:03.673000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:19:03.673000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:03.673000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40000e6100 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:03.673000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:19:04.023037 kubelet[1618]: E0515 10:19:04.023006 1618 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:19:04.023037 kubelet[1618]: E0515 10:19:04.023037 1618 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:19:04.023383 kubelet[1618]: E0515 10:19:04.023131 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:04.023383 kubelet[1618]: E0515 10:19:04.023138 1618 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:04.621000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.623265 kernel: kauditd_printk_skb: 573 callbacks suppressed May 15 10:19:04.623315 kernel: audit: type=1400 audit(1747304344.621:548): avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.621000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=40011cc090 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.628184 kernel: audit: type=1300 audit(1747304344.621:548): arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=40011cc090 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.628221 kernel: audit: type=1327 audit(1747304344.621:548): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.621000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.630502 kernel: audit: type=1400 audit(1747304344.621:549): avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.621000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.632694 kernel: audit: type=1300 audit(1747304344.621:549): arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=40037020c0 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.621000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=40037020c0 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.621000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.638074 kernel: audit: type=1327 audit(1747304344.621:549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.638164 kernel: audit: type=1400 audit(1747304344.622:550): avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7302 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.622000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7302 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.622000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=40011cc450 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.643043 kernel: audit: type=1300 audit(1747304344.622:550): arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=40011cc450 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.643078 kernel: audit: type=1327 audit(1747304344.622:550): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.622000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.645000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7308 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.645000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400757c510 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.645000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.652988 kernel: audit: type=1400 audit(1747304344.645:551): avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7308 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.654000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.654000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7f a1=4003b92c80 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.654000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.659000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:04.659000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7f a1=400757d380 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:19:04.659000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:19:04.740371 kubelet[1618]: E0515 10:19:04.740324 1618 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 10:19:04.887252 kubelet[1618]: I0515 10:19:04.887137 1618 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 15 10:19:04.887252 kubelet[1618]: E0515 10:19:04.887189 1618 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 15 10:19:04.891099 kubelet[1618]: E0515 10:19:04.891056 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:04.991235 kubelet[1618]: E0515 10:19:04.991196 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:05.091695 kubelet[1618]: E0515 10:19:05.091651 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:05.191911 kubelet[1618]: E0515 10:19:05.191798 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:05.292507 kubelet[1618]: E0515 10:19:05.292454 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:05.393259 kubelet[1618]: E0515 10:19:05.393211 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:05.493361 kubelet[1618]: E0515 10:19:05.493319 1618 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:05.590658 kubelet[1618]: I0515 10:19:05.590614 1618 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:19:05.600048 kubelet[1618]: E0515 10:19:05.600020 1618 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 15 10:19:05.600048 kubelet[1618]: I0515 10:19:05.600051 1618 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 10:19:05.601769 kubelet[1618]: E0515 10:19:05.601747 1618 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 15 10:19:05.601816 kubelet[1618]: I0515 10:19:05.601785 1618 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:19:05.603290 kubelet[1618]: E0515 10:19:05.603271 1618 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 15 10:19:05.965162 kubelet[1618]: I0515 10:19:05.965116 1618 apiserver.go:52] "Watching apiserver" May 15 10:19:05.994907 kubelet[1618]: I0515 10:19:05.994854 1618 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:19:06.619606 systemd[1]: Reloading. May 15 10:19:06.676337 /usr/lib/systemd/system-generators/torcx-generator[1917]: time="2025-05-15T10:19:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:19:06.676366 /usr/lib/systemd/system-generators/torcx-generator[1917]: time="2025-05-15T10:19:06Z" level=info msg="torcx already run" May 15 10:19:06.802312 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:19:06.802348 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:19:06.818188 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:19:06.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.883000 audit: BPF prog-id=82 op=LOAD May 15 10:19:06.883000 audit: BPF prog-id=78 op=UNLOAD May 15 10:19:06.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit: BPF prog-id=83 op=LOAD May 15 10:19:06.885000 audit: BPF prog-id=43 op=UNLOAD May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit: BPF prog-id=84 op=LOAD May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit: BPF prog-id=85 op=LOAD May 15 10:19:06.885000 audit: BPF prog-id=44 op=UNLOAD May 15 10:19:06.885000 audit: BPF prog-id=45 op=UNLOAD May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.885000 audit: BPF prog-id=86 op=LOAD May 15 10:19:06.885000 audit: BPF prog-id=46 op=UNLOAD May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit: BPF prog-id=87 op=LOAD May 15 10:19:06.886000 audit: BPF prog-id=47 op=UNLOAD May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit: BPF prog-id=88 op=LOAD May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit: BPF prog-id=89 op=LOAD May 15 10:19:06.886000 audit: BPF prog-id=48 op=UNLOAD May 15 10:19:06.886000 audit: BPF prog-id=49 op=UNLOAD May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit: BPF prog-id=90 op=LOAD May 15 10:19:06.887000 audit: BPF prog-id=50 op=UNLOAD May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit: BPF prog-id=91 op=LOAD May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.887000 audit: BPF prog-id=92 op=LOAD May 15 10:19:06.887000 audit: BPF prog-id=51 op=UNLOAD May 15 10:19:06.887000 audit: BPF prog-id=52 op=UNLOAD May 15 10:19:06.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit: BPF prog-id=93 op=LOAD May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit: BPF prog-id=94 op=LOAD May 15 10:19:06.891000 audit: BPF prog-id=53 op=UNLOAD May 15 10:19:06.891000 audit: BPF prog-id=54 op=UNLOAD May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit: BPF prog-id=95 op=LOAD May 15 10:19:06.892000 audit: BPF prog-id=55 op=UNLOAD May 15 10:19:06.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.892000 audit: BPF prog-id=96 op=LOAD May 15 10:19:06.892000 audit: BPF prog-id=56 op=UNLOAD May 15 10:19:06.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.893000 audit: BPF prog-id=97 op=LOAD May 15 10:19:06.893000 audit: BPF prog-id=58 op=UNLOAD May 15 10:19:06.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit: BPF prog-id=98 op=LOAD May 15 10:19:06.895000 audit: BPF prog-id=57 op=UNLOAD May 15 10:19:06.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.895000 audit: BPF prog-id=99 op=LOAD May 15 10:19:06.895000 audit: BPF prog-id=70 op=UNLOAD May 15 10:19:06.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit: BPF prog-id=100 op=LOAD May 15 10:19:06.897000 audit: BPF prog-id=74 op=UNLOAD May 15 10:19:06.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.897000 audit: BPF prog-id=101 op=LOAD May 15 10:19:06.897000 audit: BPF prog-id=66 op=UNLOAD May 15 10:19:06.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:06.900000 audit: BPF prog-id=102 op=LOAD May 15 10:19:06.900000 audit: BPF prog-id=62 op=UNLOAD May 15 10:19:06.917600 systemd[1]: Stopping kubelet.service... May 15 10:19:06.945477 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:19:06.945667 systemd[1]: Stopped kubelet.service. May 15 10:19:06.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:06.945734 systemd[1]: kubelet.service: Consumed 1.203s CPU time. May 15 10:19:06.947376 systemd[1]: Starting kubelet.service... May 15 10:19:07.056538 systemd[1]: Started kubelet.service. May 15 10:19:07.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:07.125622 kubelet[1959]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:19:07.125914 kubelet[1959]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 10:19:07.125958 kubelet[1959]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:19:07.126154 kubelet[1959]: I0515 10:19:07.126116 1959 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:19:07.131926 kubelet[1959]: I0515 10:19:07.131886 1959 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 10:19:07.131926 kubelet[1959]: I0515 10:19:07.131917 1959 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:19:07.132184 kubelet[1959]: I0515 10:19:07.132156 1959 server.go:954] "Client rotation is on, will bootstrap in background" May 15 10:19:07.133351 kubelet[1959]: I0515 10:19:07.133331 1959 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:19:07.135524 kubelet[1959]: I0515 10:19:07.135453 1959 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:19:07.139192 kubelet[1959]: E0515 10:19:07.139114 1959 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:19:07.139192 kubelet[1959]: I0515 10:19:07.139143 1959 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:19:07.142489 kubelet[1959]: I0515 10:19:07.142466 1959 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:19:07.142955 kubelet[1959]: I0515 10:19:07.142923 1959 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:19:07.143303 kubelet[1959]: I0515 10:19:07.143102 1959 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:19:07.143434 kubelet[1959]: I0515 10:19:07.143419 1959 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:19:07.143506 kubelet[1959]: I0515 10:19:07.143496 1959 container_manager_linux.go:304] "Creating device plugin manager" May 15 10:19:07.143614 kubelet[1959]: I0515 10:19:07.143602 1959 state_mem.go:36] "Initialized new in-memory state store" May 15 10:19:07.143820 kubelet[1959]: I0515 10:19:07.143805 1959 kubelet.go:446] "Attempting to sync node with API server" May 15 10:19:07.143900 kubelet[1959]: I0515 10:19:07.143888 1959 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:19:07.143966 kubelet[1959]: I0515 10:19:07.143955 1959 kubelet.go:352] "Adding apiserver pod source" May 15 10:19:07.144051 kubelet[1959]: I0515 10:19:07.144040 1959 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:19:07.153805 kubelet[1959]: I0515 10:19:07.149065 1959 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:19:07.154038 kubelet[1959]: I0515 10:19:07.154008 1959 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:19:07.154494 kubelet[1959]: I0515 10:19:07.154468 1959 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 10:19:07.154540 kubelet[1959]: I0515 10:19:07.154503 1959 server.go:1287] "Started kubelet" May 15 10:19:07.155813 kubelet[1959]: I0515 10:19:07.155752 1959 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:19:07.156040 kubelet[1959]: I0515 10:19:07.156020 1959 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:19:07.156000 audit[1959]: AVC avc: denied { mac_admin } for pid=1959 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:07.156000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:07.156000 audit[1959]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bbf2c0 a1=40004bfda0 a2=4000bbf290 a3=25 items=0 ppid=1 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:07.156000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:07.156000 audit[1959]: AVC avc: denied { mac_admin } for pid=1959 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:07.156000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:07.156000 audit[1959]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400039bc60 a1=40004bfdb8 a2=4000bbf350 a3=25 items=0 ppid=1 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:07.156000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:07.158129 kubelet[1959]: I0515 10:19:07.157779 1959 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:19:07.158129 kubelet[1959]: I0515 10:19:07.157821 1959 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 10:19:07.158129 kubelet[1959]: I0515 10:19:07.157860 1959 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:19:07.158129 kubelet[1959]: I0515 10:19:07.155540 1959 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:19:07.158412 kubelet[1959]: I0515 10:19:07.158375 1959 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:19:07.158928 kubelet[1959]: I0515 10:19:07.158905 1959 server.go:490] "Adding debug handlers to kubelet server" May 15 10:19:07.159756 kubelet[1959]: E0515 10:19:07.159736 1959 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:19:07.159800 kubelet[1959]: I0515 10:19:07.159772 1959 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 10:19:07.159945 kubelet[1959]: I0515 10:19:07.159923 1959 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:19:07.164701 kubelet[1959]: I0515 10:19:07.164681 1959 reconciler.go:26] "Reconciler: start to sync state" May 15 10:19:07.167595 kubelet[1959]: I0515 10:19:07.167566 1959 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:19:07.170960 kubelet[1959]: I0515 10:19:07.170938 1959 factory.go:221] Registration of the containerd container factory successfully May 15 10:19:07.171087 kubelet[1959]: I0515 10:19:07.171074 1959 factory.go:221] Registration of the systemd container factory successfully May 15 10:19:07.178945 kubelet[1959]: E0515 10:19:07.178737 1959 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:19:07.188870 kubelet[1959]: I0515 10:19:07.188823 1959 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:19:07.191315 kubelet[1959]: I0515 10:19:07.191284 1959 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:19:07.191315 kubelet[1959]: I0515 10:19:07.191311 1959 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 10:19:07.191444 kubelet[1959]: I0515 10:19:07.191330 1959 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 10:19:07.191444 kubelet[1959]: I0515 10:19:07.191336 1959 kubelet.go:2388] "Starting kubelet main sync loop" May 15 10:19:07.191444 kubelet[1959]: E0515 10:19:07.191384 1959 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:19:07.205761 kubelet[1959]: I0515 10:19:07.205736 1959 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 10:19:07.205761 kubelet[1959]: I0515 10:19:07.205754 1959 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 10:19:07.205903 kubelet[1959]: I0515 10:19:07.205773 1959 state_mem.go:36] "Initialized new in-memory state store" May 15 10:19:07.205945 kubelet[1959]: I0515 10:19:07.205926 1959 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:19:07.205988 kubelet[1959]: I0515 10:19:07.205944 1959 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:19:07.205988 kubelet[1959]: I0515 10:19:07.205963 1959 policy_none.go:49] "None policy: Start" May 15 10:19:07.205988 kubelet[1959]: I0515 10:19:07.205987 1959 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 10:19:07.206048 kubelet[1959]: I0515 10:19:07.205998 1959 state_mem.go:35] "Initializing new in-memory state store" May 15 10:19:07.206102 kubelet[1959]: I0515 10:19:07.206091 1959 state_mem.go:75] "Updated machine memory state" May 15 10:19:07.209611 kubelet[1959]: I0515 10:19:07.209582 1959 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:19:07.208000 audit[1959]: AVC avc: denied { mac_admin } for pid=1959 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:07.208000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:07.208000 audit[1959]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dad620 a1=40008d74a0 a2=4000dad5f0 a3=25 items=0 ppid=1 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:07.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:07.209882 kubelet[1959]: I0515 10:19:07.209642 1959 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:19:07.209882 kubelet[1959]: I0515 10:19:07.209785 1959 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:19:07.209882 kubelet[1959]: I0515 10:19:07.209800 1959 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:19:07.210497 kubelet[1959]: I0515 10:19:07.210470 1959 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:19:07.211004 kubelet[1959]: E0515 10:19:07.210986 1959 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 10:19:07.292306 kubelet[1959]: I0515 10:19:07.292260 1959 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:19:07.292461 kubelet[1959]: I0515 10:19:07.292371 1959 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:19:07.292594 kubelet[1959]: I0515 10:19:07.292264 1959 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 10:19:07.314598 kubelet[1959]: I0515 10:19:07.314569 1959 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:19:07.346496 kubelet[1959]: I0515 10:19:07.346455 1959 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 15 10:19:07.346661 kubelet[1959]: I0515 10:19:07.346567 1959 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 15 10:19:07.366638 kubelet[1959]: I0515 10:19:07.366579 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8dde0f06162a6075e0d81f44c9d9f06d-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"8dde0f06162a6075e0d81f44c9d9f06d\") " pod="kube-system/kube-apiserver-localhost" May 15 10:19:07.366779 kubelet[1959]: I0515 10:19:07.366661 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8dde0f06162a6075e0d81f44c9d9f06d-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"8dde0f06162a6075e0d81f44c9d9f06d\") " pod="kube-system/kube-apiserver-localhost" May 15 10:19:07.366779 kubelet[1959]: I0515 10:19:07.366692 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:07.366779 kubelet[1959]: I0515 10:19:07.366713 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:07.366846 kubelet[1959]: I0515 10:19:07.366799 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8dde0f06162a6075e0d81f44c9d9f06d-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"8dde0f06162a6075e0d81f44c9d9f06d\") " pod="kube-system/kube-apiserver-localhost" May 15 10:19:07.366846 kubelet[1959]: I0515 10:19:07.366817 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:07.366846 kubelet[1959]: I0515 10:19:07.366832 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:07.366909 kubelet[1959]: I0515 10:19:07.366857 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:19:07.366909 kubelet[1959]: I0515 10:19:07.366873 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 15 10:19:07.599214 kubelet[1959]: E0515 10:19:07.599181 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:07.604967 kubelet[1959]: E0515 10:19:07.604497 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:07.604967 kubelet[1959]: E0515 10:19:07.604851 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:08.145171 kubelet[1959]: I0515 10:19:08.145117 1959 apiserver.go:52] "Watching apiserver" May 15 10:19:08.161024 kubelet[1959]: I0515 10:19:08.160953 1959 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:19:08.199322 kubelet[1959]: I0515 10:19:08.199284 1959 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:19:08.199556 kubelet[1959]: I0515 10:19:08.199532 1959 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:19:08.199809 kubelet[1959]: E0515 10:19:08.199778 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:08.210034 kubelet[1959]: E0515 10:19:08.209998 1959 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:19:08.210317 kubelet[1959]: E0515 10:19:08.210166 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:08.211700 kubelet[1959]: E0515 10:19:08.211674 1959 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 15 10:19:08.212009 kubelet[1959]: E0515 10:19:08.211992 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:08.242273 kubelet[1959]: I0515 10:19:08.242214 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.242194421 podStartE2EDuration="1.242194421s" podCreationTimestamp="2025-05-15 10:19:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:19:08.242125915 +0000 UTC m=+1.181574988" watchObservedRunningTime="2025-05-15 10:19:08.242194421 +0000 UTC m=+1.181643494" May 15 10:19:08.242431 kubelet[1959]: I0515 10:19:08.242350 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.24232335 podStartE2EDuration="1.24232335s" podCreationTimestamp="2025-05-15 10:19:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:19:08.225080578 +0000 UTC m=+1.164529651" watchObservedRunningTime="2025-05-15 10:19:08.24232335 +0000 UTC m=+1.181772423" May 15 10:19:08.279272 kubelet[1959]: I0515 10:19:08.279225 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.279199132 podStartE2EDuration="1.279199132s" podCreationTimestamp="2025-05-15 10:19:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:19:08.260148186 +0000 UTC m=+1.199597259" watchObservedRunningTime="2025-05-15 10:19:08.279199132 +0000 UTC m=+1.218648205" May 15 10:19:09.201585 kubelet[1959]: E0515 10:19:09.201549 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:09.201999 kubelet[1959]: E0515 10:19:09.201960 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:10.203473 kubelet[1959]: E0515 10:19:10.203439 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:11.822855 sudo[1356]: pam_unix(sudo:session): session closed for user root May 15 10:19:11.821000 audit[1356]: USER_END pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:11.823483 kernel: kauditd_printk_skb: 266 callbacks suppressed May 15 10:19:11.823529 kernel: audit: type=1106 audit(1747304351.821:803): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:11.822000 audit[1356]: CRED_DISP pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:11.827848 kernel: audit: type=1104 audit(1747304351.822:804): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:11.828037 sshd[1351]: pam_unix(sshd:session): session closed for user core May 15 10:19:11.828000 audit[1351]: USER_END pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:11.829000 audit[1351]: CRED_DISP pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:11.833299 systemd[1]: sshd@6-10.0.0.84:22-10.0.0.1:52704.service: Deactivated successfully. May 15 10:19:11.833881 kernel: audit: type=1106 audit(1747304351.828:805): pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:11.833938 kernel: audit: type=1104 audit(1747304351.829:806): pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:11.833958 kernel: audit: type=1131 audit(1747304351.832:807): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:52704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:11.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.84:22-10.0.0.1:52704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:11.834028 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:19:11.834181 systemd[1]: session-7.scope: Consumed 7.280s CPU time. May 15 10:19:11.834726 systemd-logind[1207]: Session 7 logged out. Waiting for processes to exit. May 15 10:19:11.835417 systemd-logind[1207]: Removed session 7. May 15 10:19:12.135000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:12.135000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001650700 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:12.141988 kernel: audit: type=1400 audit(1747304352.135:808): avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:12.142036 kernel: audit: type=1300 audit(1747304352.135:808): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001650700 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:12.142059 kernel: audit: type=1327 audit(1747304352.135:808): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:19:12.135000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:19:12.136000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:12.146754 kernel: audit: type=1400 audit(1747304352.136:809): avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:12.146791 kernel: audit: type=1300 audit(1747304352.136:809): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003f2ea0 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:12.136000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003f2ea0 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:12.136000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:19:12.136000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:12.136000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40016b4ce0 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:12.136000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:19:12.136000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:19:12.136000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40003f2fe0 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:12.136000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:19:12.286000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7333 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:19:12.286000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f7ffc0 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:19:12.286000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:19:12.870627 kubelet[1959]: I0515 10:19:12.870583 1959 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:19:12.871412 env[1221]: time="2025-05-15T10:19:12.871351651Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:19:12.871712 kubelet[1959]: I0515 10:19:12.871591 1959 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:19:13.152530 kubelet[1959]: E0515 10:19:13.152430 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:13.208459 kubelet[1959]: E0515 10:19:13.208420 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:13.608875 kubelet[1959]: E0515 10:19:13.608837 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:13.858658 systemd[1]: Created slice kubepods-besteffort-pode7fd2955_a1c2_4a81_9565_aef7f0c99212.slice. May 15 10:19:13.922732 kubelet[1959]: I0515 10:19:13.922606 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e7fd2955-a1c2-4a81-9565-aef7f0c99212-xtables-lock\") pod \"kube-proxy-4r4h7\" (UID: \"e7fd2955-a1c2-4a81-9565-aef7f0c99212\") " pod="kube-system/kube-proxy-4r4h7" May 15 10:19:13.922732 kubelet[1959]: I0515 10:19:13.922653 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e7fd2955-a1c2-4a81-9565-aef7f0c99212-lib-modules\") pod \"kube-proxy-4r4h7\" (UID: \"e7fd2955-a1c2-4a81-9565-aef7f0c99212\") " pod="kube-system/kube-proxy-4r4h7" May 15 10:19:13.922732 kubelet[1959]: I0515 10:19:13.922675 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7z76\" (UniqueName: \"kubernetes.io/projected/e7fd2955-a1c2-4a81-9565-aef7f0c99212-kube-api-access-j7z76\") pod \"kube-proxy-4r4h7\" (UID: \"e7fd2955-a1c2-4a81-9565-aef7f0c99212\") " pod="kube-system/kube-proxy-4r4h7" May 15 10:19:13.922732 kubelet[1959]: I0515 10:19:13.922698 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e7fd2955-a1c2-4a81-9565-aef7f0c99212-kube-proxy\") pod \"kube-proxy-4r4h7\" (UID: \"e7fd2955-a1c2-4a81-9565-aef7f0c99212\") " pod="kube-system/kube-proxy-4r4h7" May 15 10:19:13.981545 systemd[1]: Created slice kubepods-besteffort-pod634a25e4_0e33_493c_89e8_d1f5c439d391.slice. May 15 10:19:14.023659 kubelet[1959]: I0515 10:19:14.023597 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/634a25e4-0e33-493c-89e8-d1f5c439d391-var-lib-calico\") pod \"tigera-operator-789496d6f5-ntmnh\" (UID: \"634a25e4-0e33-493c-89e8-d1f5c439d391\") " pod="tigera-operator/tigera-operator-789496d6f5-ntmnh" May 15 10:19:14.023659 kubelet[1959]: I0515 10:19:14.023652 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8lgx4\" (UniqueName: \"kubernetes.io/projected/634a25e4-0e33-493c-89e8-d1f5c439d391-kube-api-access-8lgx4\") pod \"tigera-operator-789496d6f5-ntmnh\" (UID: \"634a25e4-0e33-493c-89e8-d1f5c439d391\") " pod="tigera-operator/tigera-operator-789496d6f5-ntmnh" May 15 10:19:14.031481 kubelet[1959]: I0515 10:19:14.031448 1959 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 10:19:14.170655 kubelet[1959]: E0515 10:19:14.170621 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:14.171315 env[1221]: time="2025-05-15T10:19:14.171275627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4r4h7,Uid:e7fd2955-a1c2-4a81-9565-aef7f0c99212,Namespace:kube-system,Attempt:0,}" May 15 10:19:14.184171 env[1221]: time="2025-05-15T10:19:14.184045055Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:14.184171 env[1221]: time="2025-05-15T10:19:14.184122357Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:14.184171 env[1221]: time="2025-05-15T10:19:14.184148804Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:14.184961 env[1221]: time="2025-05-15T10:19:14.184696518Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/81d7f6d0a7275b6a8299b4f8421caa141fa356a65e462544b7656b6f0192b10a pid=2058 runtime=io.containerd.runc.v2 May 15 10:19:14.198528 systemd[1]: Started cri-containerd-81d7f6d0a7275b6a8299b4f8421caa141fa356a65e462544b7656b6f0192b10a.scope. May 15 10:19:14.210670 kubelet[1959]: E0515 10:19:14.210344 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:14.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit: BPF prog-id=103 op=LOAD May 15 10:19:14.238000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.238000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643766366430613732373562366138323939623466383432316361 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643766366430613732373562366138323939623466383432316361 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.239000 audit: BPF prog-id=104 op=LOAD May 15 10:19:14.239000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643766366430613732373562366138323939623466383432316361 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit: BPF prog-id=105 op=LOAD May 15 10:19:14.240000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643766366430613732373562366138323939623466383432316361 May 15 10:19:14.240000 audit: BPF prog-id=105 op=UNLOAD May 15 10:19:14.240000 audit: BPF prog-id=104 op=UNLOAD May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.240000 audit: BPF prog-id=106 op=LOAD May 15 10:19:14.240000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2058 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643766366430613732373562366138323939623466383432316361 May 15 10:19:14.252555 env[1221]: time="2025-05-15T10:19:14.252510933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4r4h7,Uid:e7fd2955-a1c2-4a81-9565-aef7f0c99212,Namespace:kube-system,Attempt:0,} returns sandbox id \"81d7f6d0a7275b6a8299b4f8421caa141fa356a65e462544b7656b6f0192b10a\"" May 15 10:19:14.253741 kubelet[1959]: E0515 10:19:14.253256 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:14.259428 env[1221]: time="2025-05-15T10:19:14.259389425Z" level=info msg="CreateContainer within sandbox \"81d7f6d0a7275b6a8299b4f8421caa141fa356a65e462544b7656b6f0192b10a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:19:14.270864 env[1221]: time="2025-05-15T10:19:14.270820397Z" level=info msg="CreateContainer within sandbox \"81d7f6d0a7275b6a8299b4f8421caa141fa356a65e462544b7656b6f0192b10a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f34c3be50b43cd3300be767ebd0437b0d1898bddc6d33fd46df6bc1a7a53c9cf\"" May 15 10:19:14.271394 env[1221]: time="2025-05-15T10:19:14.271302653Z" level=info msg="StartContainer for \"f34c3be50b43cd3300be767ebd0437b0d1898bddc6d33fd46df6bc1a7a53c9cf\"" May 15 10:19:14.284812 env[1221]: time="2025-05-15T10:19:14.284770677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-ntmnh,Uid:634a25e4-0e33-493c-89e8-d1f5c439d391,Namespace:tigera-operator,Attempt:0,}" May 15 10:19:14.286880 systemd[1]: Started cri-containerd-f34c3be50b43cd3300be767ebd0437b0d1898bddc6d33fd46df6bc1a7a53c9cf.scope. May 15 10:19:14.315008 env[1221]: time="2025-05-15T10:19:14.306050696Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:14.315008 env[1221]: time="2025-05-15T10:19:14.306087787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:14.315008 env[1221]: time="2025-05-15T10:19:14.306097749Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:14.315008 env[1221]: time="2025-05-15T10:19:14.306348420Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f9021ebc99abcc2f7e457db98600f2702f74eb242c0309bb6a9881c5bb07048 pid=2121 runtime=io.containerd.runc.v2 May 15 10:19:14.315206 kubelet[1959]: E0515 10:19:14.307559 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:14.321207 systemd[1]: Started cri-containerd-9f9021ebc99abcc2f7e457db98600f2702f74eb242c0309bb6a9881c5bb07048.scope. May 15 10:19:14.326000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2058 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346333626535306234336364333330306265373637656264303433 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.326000 audit: BPF prog-id=107 op=LOAD May 15 10:19:14.326000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2058 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346333626535306234336364333330306265373637656264303433 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.327000 audit: BPF prog-id=108 op=LOAD May 15 10:19:14.327000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2058 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346333626535306234336364333330306265373637656264303433 May 15 10:19:14.328000 audit: BPF prog-id=108 op=UNLOAD May 15 10:19:14.328000 audit: BPF prog-id=107 op=UNLOAD May 15 10:19:14.328000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.328000 audit: BPF prog-id=109 op=LOAD May 15 10:19:14.328000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2058 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346333626535306234336364333330306265373637656264303433 May 15 10:19:14.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.343000 audit: BPF prog-id=110 op=LOAD May 15 10:19:14.344000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2121 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393032316562633939616263633266376534353764623938363030 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2121 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393032316562633939616263633266376534353764623938363030 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.344000 audit: BPF prog-id=111 op=LOAD May 15 10:19:14.344000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2121 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393032316562633939616263633266376534353764623938363030 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.345000 audit: BPF prog-id=112 op=LOAD May 15 10:19:14.345000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2121 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393032316562633939616263633266376534353764623938363030 May 15 10:19:14.347000 audit: BPF prog-id=112 op=UNLOAD May 15 10:19:14.347000 audit: BPF prog-id=111 op=UNLOAD May 15 10:19:14.347000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:14.347000 audit: BPF prog-id=113 op=LOAD May 15 10:19:14.347000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2121 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966393032316562633939616263633266376534353764623938363030 May 15 10:19:14.351471 env[1221]: time="2025-05-15T10:19:14.351432368Z" level=info msg="StartContainer for \"f34c3be50b43cd3300be767ebd0437b0d1898bddc6d33fd46df6bc1a7a53c9cf\" returns successfully" May 15 10:19:14.373338 env[1221]: time="2025-05-15T10:19:14.373298912Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-ntmnh,Uid:634a25e4-0e33-493c-89e8-d1f5c439d391,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9f9021ebc99abcc2f7e457db98600f2702f74eb242c0309bb6a9881c5bb07048\"" May 15 10:19:14.374863 env[1221]: time="2025-05-15T10:19:14.374837944Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:19:14.543000 audit[2202]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.543000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc40e4fe0 a2=0 a3=1 items=0 ppid=2108 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:19:14.544000 audit[2204]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.544000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed2ec170 a2=0 a3=1 items=0 ppid=2108 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:19:14.545000 audit[2203]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.545000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef6442e0 a2=0 a3=1 items=0 ppid=2108 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:19:14.549000 audit[2205]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.549000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd0facb0 a2=0 a3=1 items=0 ppid=2108 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:19:14.550000 audit[2206]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.550000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4759e80 a2=0 a3=1 items=0 ppid=2108 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:19:14.551000 audit[2209]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.551000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb5b9db0 a2=0 a3=1 items=0 ppid=2108 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:19:14.645000 audit[2210]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.645000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe161e550 a2=0 a3=1 items=0 ppid=2108 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:19:14.648000 audit[2212]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.648000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffea268cb0 a2=0 a3=1 items=0 ppid=2108 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:19:14.654000 audit[2215]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.654000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd2eb2580 a2=0 a3=1 items=0 ppid=2108 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:19:14.655000 audit[2216]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.655000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5604730 a2=0 a3=1 items=0 ppid=2108 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:19:14.658000 audit[2218]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.658000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffeb09310 a2=0 a3=1 items=0 ppid=2108 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:19:14.658000 audit[2219]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.658000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9b9ca60 a2=0 a3=1 items=0 ppid=2108 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:19:14.661000 audit[2221]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.661000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd4a81cc0 a2=0 a3=1 items=0 ppid=2108 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:19:14.663000 audit[2224]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.663000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc251c860 a2=0 a3=1 items=0 ppid=2108 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:19:14.664000 audit[2225]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.664000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1ce2890 a2=0 a3=1 items=0 ppid=2108 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:19:14.666000 audit[2227]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.666000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffce11ab20 a2=0 a3=1 items=0 ppid=2108 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:19:14.667000 audit[2228]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.667000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd7a0bba0 a2=0 a3=1 items=0 ppid=2108 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:19:14.670000 audit[2230]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.670000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff9b47630 a2=0 a3=1 items=0 ppid=2108 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:19:14.673000 audit[2233]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.673000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeb85ac60 a2=0 a3=1 items=0 ppid=2108 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:19:14.676000 audit[2236]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.676000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc7802590 a2=0 a3=1 items=0 ppid=2108 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:19:14.677000 audit[2237]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.677000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff736cd80 a2=0 a3=1 items=0 ppid=2108 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:19:14.679000 audit[2239]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.679000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc7470330 a2=0 a3=1 items=0 ppid=2108 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:19:14.682000 audit[2242]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.682000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4663ef0 a2=0 a3=1 items=0 ppid=2108 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:19:14.683000 audit[2243]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.683000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeac368f0 a2=0 a3=1 items=0 ppid=2108 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:19:14.685000 audit[2245]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:14.685000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff656f130 a2=0 a3=1 items=0 ppid=2108 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:19:14.706000 audit[2251]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:14.706000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffffeb180f0 a2=0 a3=1 items=0 ppid=2108 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:14.717000 audit[2251]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:14.717000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffffeb180f0 a2=0 a3=1 items=0 ppid=2108 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:14.719000 audit[2256]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.719000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff367dd50 a2=0 a3=1 items=0 ppid=2108 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:19:14.721000 audit[2258]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.721000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcbdf6000 a2=0 a3=1 items=0 ppid=2108 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:19:14.726000 audit[2261]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.726000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc8bf7300 a2=0 a3=1 items=0 ppid=2108 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:19:14.727000 audit[2262]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.727000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff74ed270 a2=0 a3=1 items=0 ppid=2108 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:19:14.729000 audit[2264]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.729000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc4134670 a2=0 a3=1 items=0 ppid=2108 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:19:14.730000 audit[2265]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.730000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd22a9f0 a2=0 a3=1 items=0 ppid=2108 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:19:14.732000 audit[2267]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.732000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffff618190 a2=0 a3=1 items=0 ppid=2108 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:19:14.735000 audit[2270]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.735000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffdfa5b270 a2=0 a3=1 items=0 ppid=2108 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:19:14.736000 audit[2271]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.736000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6786af0 a2=0 a3=1 items=0 ppid=2108 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:19:14.738000 audit[2273]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.738000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff231eea0 a2=0 a3=1 items=0 ppid=2108 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:19:14.739000 audit[2274]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.739000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5944170 a2=0 a3=1 items=0 ppid=2108 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:19:14.741000 audit[2276]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.741000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2caa080 a2=0 a3=1 items=0 ppid=2108 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:19:14.744000 audit[2279]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.744000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcafaef80 a2=0 a3=1 items=0 ppid=2108 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:19:14.747000 audit[2282]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.747000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff37f5510 a2=0 a3=1 items=0 ppid=2108 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:19:14.748000 audit[2283]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.748000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff84d8660 a2=0 a3=1 items=0 ppid=2108 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:19:14.751000 audit[2285]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.751000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcf672a90 a2=0 a3=1 items=0 ppid=2108 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:19:14.755000 audit[2288]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.755000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd37fa870 a2=0 a3=1 items=0 ppid=2108 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:19:14.756000 audit[2289]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.756000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd79166c0 a2=0 a3=1 items=0 ppid=2108 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:19:14.759000 audit[2291]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.759000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdb812470 a2=0 a3=1 items=0 ppid=2108 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:19:14.760000 audit[2292]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.760000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3f30ba0 a2=0 a3=1 items=0 ppid=2108 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:19:14.762000 audit[2294]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.762000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeec5b110 a2=0 a3=1 items=0 ppid=2108 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:19:14.765000 audit[2297]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:14.765000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd0fc5910 a2=0 a3=1 items=0 ppid=2108 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:19:14.768000 audit[2299]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:19:14.768000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffcc372cb0 a2=0 a3=1 items=0 ppid=2108 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.768000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:14.768000 audit[2299]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:19:14.768000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffcc372cb0 a2=0 a3=1 items=0 ppid=2108 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:14.768000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:15.214168 kubelet[1959]: E0515 10:19:15.214139 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:15.214469 kubelet[1959]: E0515 10:19:15.214288 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:15.214469 kubelet[1959]: E0515 10:19:15.214417 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:15.893680 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2657224673.mount: Deactivated successfully. May 15 10:19:16.215727 kubelet[1959]: E0515 10:19:16.215684 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:16.377184 env[1221]: time="2025-05-15T10:19:16.377138600Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:16.378860 env[1221]: time="2025-05-15T10:19:16.378832627Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:16.380697 env[1221]: time="2025-05-15T10:19:16.380662168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:16.382136 env[1221]: time="2025-05-15T10:19:16.382109212Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:16.382643 env[1221]: time="2025-05-15T10:19:16.382618981Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:27f7c2cfac802523e44ecd16453a4cc992f6c7d610c13054f2715a7cb4370565\"" May 15 10:19:16.385856 env[1221]: time="2025-05-15T10:19:16.385815266Z" level=info msg="CreateContainer within sandbox \"9f9021ebc99abcc2f7e457db98600f2702f74eb242c0309bb6a9881c5bb07048\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:19:16.393488 env[1221]: time="2025-05-15T10:19:16.393438027Z" level=info msg="CreateContainer within sandbox \"9f9021ebc99abcc2f7e457db98600f2702f74eb242c0309bb6a9881c5bb07048\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"cbb27c3d2883c9f6abbbdb09bc180a9d715b494977d72d25403093536ac00910\"" May 15 10:19:16.394026 env[1221]: time="2025-05-15T10:19:16.393915587Z" level=info msg="StartContainer for \"cbb27c3d2883c9f6abbbdb09bc180a9d715b494977d72d25403093536ac00910\"" May 15 10:19:16.427253 systemd[1]: run-containerd-runc-k8s.io-cbb27c3d2883c9f6abbbdb09bc180a9d715b494977d72d25403093536ac00910-runc.Hk6LCc.mount: Deactivated successfully. May 15 10:19:16.434218 systemd[1]: Started cri-containerd-cbb27c3d2883c9f6abbbdb09bc180a9d715b494977d72d25403093536ac00910.scope. May 15 10:19:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit: BPF prog-id=114 op=LOAD May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2121 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:16.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623237633364323838336339663661626262646230396263313830 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2121 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:16.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623237633364323838336339663661626262646230396263313830 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit: BPF prog-id=115 op=LOAD May 15 10:19:16.454000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2121 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:16.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623237633364323838336339663661626262646230396263313830 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit: BPF prog-id=116 op=LOAD May 15 10:19:16.454000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2121 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:16.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623237633364323838336339663661626262646230396263313830 May 15 10:19:16.454000 audit: BPF prog-id=116 op=UNLOAD May 15 10:19:16.454000 audit: BPF prog-id=115 op=UNLOAD May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:16.454000 audit: BPF prog-id=117 op=LOAD May 15 10:19:16.454000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2121 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:16.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623237633364323838336339663661626262646230396263313830 May 15 10:19:16.477266 env[1221]: time="2025-05-15T10:19:16.477180728Z" level=info msg="StartContainer for \"cbb27c3d2883c9f6abbbdb09bc180a9d715b494977d72d25403093536ac00910\" returns successfully" May 15 10:19:17.238153 kubelet[1959]: I0515 10:19:17.231856 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-4r4h7" podStartSLOduration=4.231839969 podStartE2EDuration="4.231839969s" podCreationTimestamp="2025-05-15 10:19:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:19:15.22355814 +0000 UTC m=+8.163007213" watchObservedRunningTime="2025-05-15 10:19:17.231839969 +0000 UTC m=+10.171289042" May 15 10:19:19.917110 kernel: kauditd_printk_skb: 377 callbacks suppressed May 15 10:19:19.917262 kernel: audit: type=1325 audit(1747304359.909:924): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:19.917314 kernel: audit: type=1300 audit(1747304359.909:924): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffec239dc0 a2=0 a3=1 items=0 ppid=2108 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:19.917351 kernel: audit: type=1327 audit(1747304359.909:924): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:19.909000 audit[2340]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:19.909000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffec239dc0 a2=0 a3=1 items=0 ppid=2108 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:19.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:19.920000 audit[2340]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:19.923990 kernel: audit: type=1325 audit(1747304359.920:925): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:19.920000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffec239dc0 a2=0 a3=1 items=0 ppid=2108 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:19.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:19.930606 kernel: audit: type=1300 audit(1747304359.920:925): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffec239dc0 a2=0 a3=1 items=0 ppid=2108 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:19.930670 kernel: audit: type=1327 audit(1747304359.920:925): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:19.939000 audit[2343]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:19.939000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffcc4915c0 a2=0 a3=1 items=0 ppid=2108 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:19.945031 kernel: audit: type=1325 audit(1747304359.939:926): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:19.945104 kernel: audit: type=1300 audit(1747304359.939:926): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffcc4915c0 a2=0 a3=1 items=0 ppid=2108 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:19.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:19.946675 kernel: audit: type=1327 audit(1747304359.939:926): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:19.948000 audit[2343]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:19.948000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcc4915c0 a2=0 a3=1 items=0 ppid=2108 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:19.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:19.951994 kernel: audit: type=1325 audit(1747304359.948:927): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:20.053903 kubelet[1959]: I0515 10:19:20.053826 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-ntmnh" podStartSLOduration=5.044233801 podStartE2EDuration="7.053805863s" podCreationTimestamp="2025-05-15 10:19:13 +0000 UTC" firstStartedPulling="2025-05-15 10:19:14.374343405 +0000 UTC m=+7.313792438" lastFinishedPulling="2025-05-15 10:19:16.383915427 +0000 UTC m=+9.323364500" observedRunningTime="2025-05-15 10:19:17.232118356 +0000 UTC m=+10.171567429" watchObservedRunningTime="2025-05-15 10:19:20.053805863 +0000 UTC m=+12.993254936" May 15 10:19:20.059162 systemd[1]: Created slice kubepods-besteffort-podefa9cd6b_438f_414a_8d91_30668d873345.slice. May 15 10:19:20.137512 systemd[1]: Created slice kubepods-besteffort-pod018c4d19_e254_4179_9bf8_961c9700738a.slice. May 15 10:19:20.165457 kubelet[1959]: I0515 10:19:20.165401 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/efa9cd6b-438f-414a-8d91-30668d873345-tigera-ca-bundle\") pod \"calico-typha-7c585fb54d-5dmql\" (UID: \"efa9cd6b-438f-414a-8d91-30668d873345\") " pod="calico-system/calico-typha-7c585fb54d-5dmql" May 15 10:19:20.165457 kubelet[1959]: I0515 10:19:20.165457 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-cni-bin-dir\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165646 kubelet[1959]: I0515 10:19:20.165507 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-cni-log-dir\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165646 kubelet[1959]: I0515 10:19:20.165529 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-lib-modules\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165646 kubelet[1959]: I0515 10:19:20.165570 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/018c4d19-e254-4179-9bf8-961c9700738a-tigera-ca-bundle\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165646 kubelet[1959]: I0515 10:19:20.165588 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/018c4d19-e254-4179-9bf8-961c9700738a-node-certs\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165646 kubelet[1959]: I0515 10:19:20.165606 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/efa9cd6b-438f-414a-8d91-30668d873345-typha-certs\") pod \"calico-typha-7c585fb54d-5dmql\" (UID: \"efa9cd6b-438f-414a-8d91-30668d873345\") " pod="calico-system/calico-typha-7c585fb54d-5dmql" May 15 10:19:20.165763 kubelet[1959]: I0515 10:19:20.165653 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-var-run-calico\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165763 kubelet[1959]: I0515 10:19:20.165669 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-76dhx\" (UniqueName: \"kubernetes.io/projected/018c4d19-e254-4179-9bf8-961c9700738a-kube-api-access-76dhx\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165763 kubelet[1959]: I0515 10:19:20.165686 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c82j9\" (UniqueName: \"kubernetes.io/projected/efa9cd6b-438f-414a-8d91-30668d873345-kube-api-access-c82j9\") pod \"calico-typha-7c585fb54d-5dmql\" (UID: \"efa9cd6b-438f-414a-8d91-30668d873345\") " pod="calico-system/calico-typha-7c585fb54d-5dmql" May 15 10:19:20.165763 kubelet[1959]: I0515 10:19:20.165734 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-policysync\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165763 kubelet[1959]: I0515 10:19:20.165749 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-var-lib-calico\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165870 kubelet[1959]: I0515 10:19:20.165763 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-flexvol-driver-host\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165870 kubelet[1959]: I0515 10:19:20.165804 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-xtables-lock\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.165870 kubelet[1959]: I0515 10:19:20.165821 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/018c4d19-e254-4179-9bf8-961c9700738a-cni-net-dir\") pod \"calico-node-5zvq5\" (UID: \"018c4d19-e254-4179-9bf8-961c9700738a\") " pod="calico-system/calico-node-5zvq5" May 15 10:19:20.245879 kubelet[1959]: E0515 10:19:20.245831 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76scb" podUID="3c40d6c0-7b50-499e-8d90-66ba3800bea7" May 15 10:19:20.266503 kubelet[1959]: I0515 10:19:20.266460 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3c40d6c0-7b50-499e-8d90-66ba3800bea7-kubelet-dir\") pod \"csi-node-driver-76scb\" (UID: \"3c40d6c0-7b50-499e-8d90-66ba3800bea7\") " pod="calico-system/csi-node-driver-76scb" May 15 10:19:20.266629 kubelet[1959]: I0515 10:19:20.266564 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3c40d6c0-7b50-499e-8d90-66ba3800bea7-registration-dir\") pod \"csi-node-driver-76scb\" (UID: \"3c40d6c0-7b50-499e-8d90-66ba3800bea7\") " pod="calico-system/csi-node-driver-76scb" May 15 10:19:20.266657 kubelet[1959]: I0515 10:19:20.266640 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3c40d6c0-7b50-499e-8d90-66ba3800bea7-socket-dir\") pod \"csi-node-driver-76scb\" (UID: \"3c40d6c0-7b50-499e-8d90-66ba3800bea7\") " pod="calico-system/csi-node-driver-76scb" May 15 10:19:20.266704 kubelet[1959]: I0515 10:19:20.266679 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3c40d6c0-7b50-499e-8d90-66ba3800bea7-varrun\") pod \"csi-node-driver-76scb\" (UID: \"3c40d6c0-7b50-499e-8d90-66ba3800bea7\") " pod="calico-system/csi-node-driver-76scb" May 15 10:19:20.266704 kubelet[1959]: I0515 10:19:20.266697 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j28bb\" (UniqueName: \"kubernetes.io/projected/3c40d6c0-7b50-499e-8d90-66ba3800bea7-kube-api-access-j28bb\") pod \"csi-node-driver-76scb\" (UID: \"3c40d6c0-7b50-499e-8d90-66ba3800bea7\") " pod="calico-system/csi-node-driver-76scb" May 15 10:19:20.267219 kubelet[1959]: E0515 10:19:20.267199 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.267351 kubelet[1959]: W0515 10:19:20.267332 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.267428 kubelet[1959]: E0515 10:19:20.267414 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.267705 kubelet[1959]: E0515 10:19:20.267692 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.267789 kubelet[1959]: W0515 10:19:20.267775 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.267855 kubelet[1959]: E0515 10:19:20.267842 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.268105 kubelet[1959]: E0515 10:19:20.268092 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.268194 kubelet[1959]: W0515 10:19:20.268180 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.268284 kubelet[1959]: E0515 10:19:20.268263 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.268548 kubelet[1959]: E0515 10:19:20.268532 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.268630 kubelet[1959]: W0515 10:19:20.268616 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.268702 kubelet[1959]: E0515 10:19:20.268688 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.268944 kubelet[1959]: E0515 10:19:20.268910 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.268944 kubelet[1959]: W0515 10:19:20.268928 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.269049 kubelet[1959]: E0515 10:19:20.268947 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.269212 kubelet[1959]: E0515 10:19:20.269180 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.269212 kubelet[1959]: W0515 10:19:20.269200 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.269302 kubelet[1959]: E0515 10:19:20.269218 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.269865 kubelet[1959]: E0515 10:19:20.269832 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.269865 kubelet[1959]: W0515 10:19:20.269855 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.269962 kubelet[1959]: E0515 10:19:20.269876 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.270307 kubelet[1959]: E0515 10:19:20.270284 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.270307 kubelet[1959]: W0515 10:19:20.270303 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.270386 kubelet[1959]: E0515 10:19:20.270323 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.270557 kubelet[1959]: E0515 10:19:20.270537 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.270557 kubelet[1959]: W0515 10:19:20.270554 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.270628 kubelet[1959]: E0515 10:19:20.270569 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.271351 kubelet[1959]: E0515 10:19:20.271325 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.271351 kubelet[1959]: W0515 10:19:20.271348 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.271428 kubelet[1959]: E0515 10:19:20.271367 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.271727 kubelet[1959]: E0515 10:19:20.271705 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.271780 kubelet[1959]: W0515 10:19:20.271727 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.271780 kubelet[1959]: E0515 10:19:20.271746 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.272153 kubelet[1959]: E0515 10:19:20.272127 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.272153 kubelet[1959]: W0515 10:19:20.272149 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.272227 kubelet[1959]: E0515 10:19:20.272167 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.272646 kubelet[1959]: E0515 10:19:20.272620 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.272646 kubelet[1959]: W0515 10:19:20.272644 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.272711 kubelet[1959]: E0515 10:19:20.272663 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.272904 kubelet[1959]: E0515 10:19:20.272886 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.272904 kubelet[1959]: W0515 10:19:20.272902 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.272988 kubelet[1959]: E0515 10:19:20.272914 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.273113 kubelet[1959]: E0515 10:19:20.273094 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.273113 kubelet[1959]: W0515 10:19:20.273110 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.273169 kubelet[1959]: E0515 10:19:20.273125 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.275173 kubelet[1959]: E0515 10:19:20.275152 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.275173 kubelet[1959]: W0515 10:19:20.275169 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.275320 kubelet[1959]: E0515 10:19:20.275185 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.275421 kubelet[1959]: E0515 10:19:20.275399 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.275421 kubelet[1959]: W0515 10:19:20.275415 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.275503 kubelet[1959]: E0515 10:19:20.275484 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.275872 kubelet[1959]: E0515 10:19:20.275847 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.275872 kubelet[1959]: W0515 10:19:20.275868 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.276067 kubelet[1959]: E0515 10:19:20.276048 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.276067 kubelet[1959]: W0515 10:19:20.276061 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.276238 kubelet[1959]: E0515 10:19:20.276217 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.276238 kubelet[1959]: W0515 10:19:20.276229 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.276376 kubelet[1959]: E0515 10:19:20.276358 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.276376 kubelet[1959]: W0515 10:19:20.276370 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.276502 kubelet[1959]: E0515 10:19:20.276485 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.276502 kubelet[1959]: W0515 10:19:20.276496 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.276560 kubelet[1959]: E0515 10:19:20.276506 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.276560 kubelet[1959]: E0515 10:19:20.276532 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.276671 kubelet[1959]: E0515 10:19:20.276651 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.276671 kubelet[1959]: W0515 10:19:20.276664 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.276732 kubelet[1959]: E0515 10:19:20.276672 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.276840 kubelet[1959]: E0515 10:19:20.276819 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.276840 kubelet[1959]: W0515 10:19:20.276831 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.276840 kubelet[1959]: E0515 10:19:20.276838 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.276919 kubelet[1959]: E0515 10:19:20.276853 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.277031 kubelet[1959]: E0515 10:19:20.277012 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.277031 kubelet[1959]: W0515 10:19:20.277027 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.277118 kubelet[1959]: E0515 10:19:20.277038 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.278083 kubelet[1959]: E0515 10:19:20.278055 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.278203 kubelet[1959]: E0515 10:19:20.278181 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.279154 kubelet[1959]: E0515 10:19:20.279123 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.279154 kubelet[1959]: W0515 10:19:20.279141 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.279154 kubelet[1959]: E0515 10:19:20.279160 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.282328 kubelet[1959]: E0515 10:19:20.282308 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.282440 kubelet[1959]: W0515 10:19:20.282424 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.282503 kubelet[1959]: E0515 10:19:20.282491 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.286573 kubelet[1959]: E0515 10:19:20.284638 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.286573 kubelet[1959]: W0515 10:19:20.284659 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.286573 kubelet[1959]: E0515 10:19:20.284675 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.286731 kubelet[1959]: E0515 10:19:20.286704 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.286731 kubelet[1959]: W0515 10:19:20.286727 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.286791 kubelet[1959]: E0515 10:19:20.286742 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.286959 kubelet[1959]: E0515 10:19:20.286938 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.286959 kubelet[1959]: W0515 10:19:20.286950 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.287045 kubelet[1959]: E0515 10:19:20.286961 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.287953 kubelet[1959]: E0515 10:19:20.287927 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.287953 kubelet[1959]: W0515 10:19:20.287943 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.288083 kubelet[1959]: E0515 10:19:20.288051 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.288194 kubelet[1959]: E0515 10:19:20.288171 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.288194 kubelet[1959]: W0515 10:19:20.288186 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.288259 kubelet[1959]: E0515 10:19:20.288196 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.292126 kubelet[1959]: E0515 10:19:20.292106 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.292219 kubelet[1959]: W0515 10:19:20.292205 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.292295 kubelet[1959]: E0515 10:19:20.292268 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.300099 kubelet[1959]: E0515 10:19:20.300079 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.300209 kubelet[1959]: W0515 10:19:20.300191 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.300300 kubelet[1959]: E0515 10:19:20.300272 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.361933 kubelet[1959]: E0515 10:19:20.361898 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:20.362399 env[1221]: time="2025-05-15T10:19:20.362361387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7c585fb54d-5dmql,Uid:efa9cd6b-438f-414a-8d91-30668d873345,Namespace:calico-system,Attempt:0,}" May 15 10:19:20.367296 kubelet[1959]: E0515 10:19:20.367270 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.367296 kubelet[1959]: W0515 10:19:20.367289 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.367402 kubelet[1959]: E0515 10:19:20.367314 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.367692 kubelet[1959]: E0515 10:19:20.367675 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.367692 kubelet[1959]: W0515 10:19:20.367690 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.367761 kubelet[1959]: E0515 10:19:20.367708 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.367991 kubelet[1959]: E0515 10:19:20.367964 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.367991 kubelet[1959]: W0515 10:19:20.367990 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.368056 kubelet[1959]: E0515 10:19:20.368007 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.368288 kubelet[1959]: E0515 10:19:20.368272 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.368288 kubelet[1959]: W0515 10:19:20.368287 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.368360 kubelet[1959]: E0515 10:19:20.368314 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.368564 kubelet[1959]: E0515 10:19:20.368549 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.368604 kubelet[1959]: W0515 10:19:20.368587 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.368637 kubelet[1959]: E0515 10:19:20.368610 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.368895 kubelet[1959]: E0515 10:19:20.368877 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.368895 kubelet[1959]: W0515 10:19:20.368894 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.368979 kubelet[1959]: E0515 10:19:20.368933 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.369202 kubelet[1959]: E0515 10:19:20.369186 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.369202 kubelet[1959]: W0515 10:19:20.369201 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.369318 kubelet[1959]: E0515 10:19:20.369289 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.369717 kubelet[1959]: E0515 10:19:20.369694 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.369781 kubelet[1959]: W0515 10:19:20.369714 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.369848 kubelet[1959]: E0515 10:19:20.369832 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.370092 kubelet[1959]: E0515 10:19:20.370074 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.370132 kubelet[1959]: W0515 10:19:20.370091 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.370199 kubelet[1959]: E0515 10:19:20.370184 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.370344 kubelet[1959]: E0515 10:19:20.370325 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.370380 kubelet[1959]: W0515 10:19:20.370343 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.372818 kubelet[1959]: E0515 10:19:20.372089 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.373189 kubelet[1959]: E0515 10:19:20.373148 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.373189 kubelet[1959]: W0515 10:19:20.373166 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.373347 kubelet[1959]: E0515 10:19:20.373268 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.373449 kubelet[1959]: E0515 10:19:20.373423 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.373449 kubelet[1959]: W0515 10:19:20.373434 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.373585 kubelet[1959]: E0515 10:19:20.373511 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.373622 kubelet[1959]: E0515 10:19:20.373610 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.373622 kubelet[1959]: W0515 10:19:20.373619 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.373674 kubelet[1959]: E0515 10:19:20.373658 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.373779 kubelet[1959]: E0515 10:19:20.373764 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.373779 kubelet[1959]: W0515 10:19:20.373776 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.373846 kubelet[1959]: E0515 10:19:20.373819 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.373943 kubelet[1959]: E0515 10:19:20.373922 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.373943 kubelet[1959]: W0515 10:19:20.373941 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.374041 kubelet[1959]: E0515 10:19:20.374019 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.374139 kubelet[1959]: E0515 10:19:20.374122 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.374139 kubelet[1959]: W0515 10:19:20.374136 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.374206 kubelet[1959]: E0515 10:19:20.374153 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.374439 kubelet[1959]: E0515 10:19:20.374424 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.374496 kubelet[1959]: W0515 10:19:20.374442 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.374496 kubelet[1959]: E0515 10:19:20.374453 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.374697 kubelet[1959]: E0515 10:19:20.374629 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.374697 kubelet[1959]: W0515 10:19:20.374641 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.374697 kubelet[1959]: E0515 10:19:20.374656 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.374968 kubelet[1959]: E0515 10:19:20.374953 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.375017 kubelet[1959]: W0515 10:19:20.374968 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.375063 kubelet[1959]: E0515 10:19:20.375042 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.375214 kubelet[1959]: E0515 10:19:20.375202 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.375214 kubelet[1959]: W0515 10:19:20.375213 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.375335 kubelet[1959]: E0515 10:19:20.375314 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.375421 kubelet[1959]: E0515 10:19:20.375371 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.375501 kubelet[1959]: W0515 10:19:20.375485 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.375769 kubelet[1959]: E0515 10:19:20.375754 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.376049 kubelet[1959]: W0515 10:19:20.375952 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.376205 kubelet[1959]: E0515 10:19:20.375873 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.376249 kubelet[1959]: E0515 10:19:20.376200 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.376758 kubelet[1959]: E0515 10:19:20.376739 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.376858 kubelet[1959]: W0515 10:19:20.376841 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.376923 kubelet[1959]: E0515 10:19:20.376912 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.377198 kubelet[1959]: E0515 10:19:20.377183 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.377279 kubelet[1959]: W0515 10:19:20.377265 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.377376 kubelet[1959]: E0515 10:19:20.377361 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.378150 env[1221]: time="2025-05-15T10:19:20.377995257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:20.378150 env[1221]: time="2025-05-15T10:19:20.378052149Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:20.378150 env[1221]: time="2025-05-15T10:19:20.378062751Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:20.378910 env[1221]: time="2025-05-15T10:19:20.378862994Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a pid=2410 runtime=io.containerd.runc.v2 May 15 10:19:20.379838 kubelet[1959]: E0515 10:19:20.379815 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.379943 kubelet[1959]: W0515 10:19:20.379927 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.380050 kubelet[1959]: E0515 10:19:20.380033 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.388903 kubelet[1959]: E0515 10:19:20.388877 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:20.388903 kubelet[1959]: W0515 10:19:20.388898 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:20.389047 kubelet[1959]: E0515 10:19:20.388922 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:20.395331 systemd[1]: Started cri-containerd-370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a.scope. May 15 10:19:20.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.425000 audit: BPF prog-id=118 op=LOAD May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2410 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306363666432383131383138303962636437663862656539633863 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2410 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306363666432383131383138303962636437663862656539633863 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit: BPF prog-id=119 op=LOAD May 15 10:19:20.426000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2410 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306363666432383131383138303962636437663862656539633863 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit: BPF prog-id=120 op=LOAD May 15 10:19:20.426000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2410 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306363666432383131383138303962636437663862656539633863 May 15 10:19:20.426000 audit: BPF prog-id=120 op=UNLOAD May 15 10:19:20.426000 audit: BPF prog-id=119 op=UNLOAD May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.426000 audit: BPF prog-id=121 op=LOAD May 15 10:19:20.426000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2410 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306363666432383131383138303962636437663862656539633863 May 15 10:19:20.439430 kubelet[1959]: E0515 10:19:20.439401 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:20.440445 env[1221]: time="2025-05-15T10:19:20.440405833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5zvq5,Uid:018c4d19-e254-4179-9bf8-961c9700738a,Namespace:calico-system,Attempt:0,}" May 15 10:19:20.450655 env[1221]: time="2025-05-15T10:19:20.450599913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7c585fb54d-5dmql,Uid:efa9cd6b-438f-414a-8d91-30668d873345,Namespace:calico-system,Attempt:0,} returns sandbox id \"370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a\"" May 15 10:19:20.451400 kubelet[1959]: E0515 10:19:20.451374 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:20.454075 env[1221]: time="2025-05-15T10:19:20.454022012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:19:20.520592 env[1221]: time="2025-05-15T10:19:20.516342689Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:20.520592 env[1221]: time="2025-05-15T10:19:20.516425666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:20.520592 env[1221]: time="2025-05-15T10:19:20.516451271Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:20.520592 env[1221]: time="2025-05-15T10:19:20.516612704Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d pid=2456 runtime=io.containerd.runc.v2 May 15 10:19:20.528610 systemd[1]: Started cri-containerd-441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d.scope. May 15 10:19:20.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit: BPF prog-id=122 op=LOAD May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434316438656233663362653736373564623366623338663636376230 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434316438656233663362653736373564623366623338663636376230 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit: BPF prog-id=123 op=LOAD May 15 10:19:20.562000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434316438656233663362653736373564623366623338663636376230 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit: BPF prog-id=124 op=LOAD May 15 10:19:20.562000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434316438656233663362653736373564623366623338663636376230 May 15 10:19:20.562000 audit: BPF prog-id=124 op=UNLOAD May 15 10:19:20.562000 audit: BPF prog-id=123 op=UNLOAD May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { perfmon } for pid=2465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit[2465]: AVC avc: denied { bpf } for pid=2465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:20.562000 audit: BPF prog-id=125 op=LOAD May 15 10:19:20.562000 audit[2465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2456 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434316438656233663362653736373564623366623338663636376230 May 15 10:19:20.574926 env[1221]: time="2025-05-15T10:19:20.574884635Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5zvq5,Uid:018c4d19-e254-4179-9bf8-961c9700738a,Namespace:calico-system,Attempt:0,} returns sandbox id \"441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d\"" May 15 10:19:20.578794 kubelet[1959]: E0515 10:19:20.578486 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:20.959000 audit[2489]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:20.959000 audit[2489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc3c39470 a2=0 a3=1 items=0 ppid=2108 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:20.965000 audit[2489]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:20.965000 audit[2489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc3c39470 a2=0 a3=1 items=0 ppid=2108 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:20.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:21.980066 update_engine[1209]: I0515 10:19:21.980018 1209 update_attempter.cc:509] Updating boot flags... May 15 10:19:22.192186 kubelet[1959]: E0515 10:19:22.191821 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76scb" podUID="3c40d6c0-7b50-499e-8d90-66ba3800bea7" May 15 10:19:22.228982 env[1221]: time="2025-05-15T10:19:22.228594403Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:22.229964 env[1221]: time="2025-05-15T10:19:22.229921647Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:22.231102 env[1221]: time="2025-05-15T10:19:22.231023731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:22.232628 env[1221]: time="2025-05-15T10:19:22.232266000Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:22.232882 env[1221]: time="2025-05-15T10:19:22.232849827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 15 10:19:22.235390 env[1221]: time="2025-05-15T10:19:22.234592469Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:19:22.243304 env[1221]: time="2025-05-15T10:19:22.243234542Z" level=info msg="CreateContainer within sandbox \"370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:19:22.256847 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount681640659.mount: Deactivated successfully. May 15 10:19:22.261459 env[1221]: time="2025-05-15T10:19:22.261408132Z" level=info msg="CreateContainer within sandbox \"370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\"" May 15 10:19:22.262093 env[1221]: time="2025-05-15T10:19:22.262065374Z" level=info msg="StartContainer for \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\"" May 15 10:19:22.299403 systemd[1]: Started cri-containerd-58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e.scope. May 15 10:19:22.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.322000 audit: BPF prog-id=126 op=LOAD May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2410 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:22.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666333373531656336623463376538623062663535653265313064 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2410 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:22.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666333373531656336623463376538623062663535653265313064 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit: BPF prog-id=127 op=LOAD May 15 10:19:22.323000 audit[2515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2410 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:22.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666333373531656336623463376538623062663535653265313064 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit: BPF prog-id=128 op=LOAD May 15 10:19:22.323000 audit[2515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2410 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:22.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666333373531656336623463376538623062663535653265313064 May 15 10:19:22.323000 audit: BPF prog-id=128 op=UNLOAD May 15 10:19:22.323000 audit: BPF prog-id=127 op=UNLOAD May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { perfmon } for pid=2515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit[2515]: AVC avc: denied { bpf } for pid=2515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:22.323000 audit: BPF prog-id=129 op=LOAD May 15 10:19:22.323000 audit[2515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2410 pid=2515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:22.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666333373531656336623463376538623062663535653265313064 May 15 10:19:22.345757 env[1221]: time="2025-05-15T10:19:22.345712475Z" level=info msg="StartContainer for \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\" returns successfully" May 15 10:19:23.233942 kubelet[1959]: E0515 10:19:23.233901 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:23.248810 kubelet[1959]: I0515 10:19:23.248752 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7c585fb54d-5dmql" podStartSLOduration=1.467684896 podStartE2EDuration="3.248737986s" podCreationTimestamp="2025-05-15 10:19:20 +0000 UTC" firstStartedPulling="2025-05-15 10:19:20.452814005 +0000 UTC m=+13.392263078" lastFinishedPulling="2025-05-15 10:19:22.233867095 +0000 UTC m=+15.173316168" observedRunningTime="2025-05-15 10:19:23.247649875 +0000 UTC m=+16.187098948" watchObservedRunningTime="2025-05-15 10:19:23.248737986 +0000 UTC m=+16.188187059" May 15 10:19:23.272855 kubelet[1959]: E0515 10:19:23.272813 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.272855 kubelet[1959]: W0515 10:19:23.272846 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.272855 kubelet[1959]: E0515 10:19:23.272870 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.273171 kubelet[1959]: E0515 10:19:23.273094 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.278613 kubelet[1959]: W0515 10:19:23.273109 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.278613 kubelet[1959]: E0515 10:19:23.278617 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.278877 kubelet[1959]: E0515 10:19:23.278859 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.278877 kubelet[1959]: W0515 10:19:23.278874 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.278957 kubelet[1959]: E0515 10:19:23.278886 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.281107 kubelet[1959]: E0515 10:19:23.281078 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.281107 kubelet[1959]: W0515 10:19:23.281098 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.281107 kubelet[1959]: E0515 10:19:23.281114 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.281332 kubelet[1959]: E0515 10:19:23.281318 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.281332 kubelet[1959]: W0515 10:19:23.281330 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.281408 kubelet[1959]: E0515 10:19:23.281339 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.281563 kubelet[1959]: E0515 10:19:23.281547 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.281563 kubelet[1959]: W0515 10:19:23.281560 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.281647 kubelet[1959]: E0515 10:19:23.281570 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.281846 kubelet[1959]: E0515 10:19:23.281722 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.281846 kubelet[1959]: W0515 10:19:23.281733 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.281846 kubelet[1959]: E0515 10:19:23.281742 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.281984 kubelet[1959]: E0515 10:19:23.281952 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.282027 kubelet[1959]: W0515 10:19:23.281988 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.282027 kubelet[1959]: E0515 10:19:23.282000 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.282682 kubelet[1959]: E0515 10:19:23.282161 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.282682 kubelet[1959]: W0515 10:19:23.282172 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.282682 kubelet[1959]: E0515 10:19:23.282181 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.282682 kubelet[1959]: E0515 10:19:23.282350 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.282682 kubelet[1959]: W0515 10:19:23.282360 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.282682 kubelet[1959]: E0515 10:19:23.282368 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.282682 kubelet[1959]: E0515 10:19:23.282503 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.282682 kubelet[1959]: W0515 10:19:23.282510 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.282682 kubelet[1959]: E0515 10:19:23.282517 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.283165 kubelet[1959]: E0515 10:19:23.283148 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.283165 kubelet[1959]: W0515 10:19:23.283162 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.283261 kubelet[1959]: E0515 10:19:23.283173 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.283351 kubelet[1959]: E0515 10:19:23.283339 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.283351 kubelet[1959]: W0515 10:19:23.283349 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.283422 kubelet[1959]: E0515 10:19:23.283359 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.286186 kubelet[1959]: E0515 10:19:23.286159 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.286186 kubelet[1959]: W0515 10:19:23.286176 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.286186 kubelet[1959]: E0515 10:19:23.286188 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.286366 kubelet[1959]: E0515 10:19:23.286348 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.286366 kubelet[1959]: W0515 10:19:23.286361 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.286433 kubelet[1959]: E0515 10:19:23.286370 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.290998 kubelet[1959]: E0515 10:19:23.290804 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.290998 kubelet[1959]: W0515 10:19:23.290839 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.290998 kubelet[1959]: E0515 10:19:23.290853 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.291306 kubelet[1959]: E0515 10:19:23.291208 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.291306 kubelet[1959]: W0515 10:19:23.291222 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.291306 kubelet[1959]: E0515 10:19:23.291250 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.291482 kubelet[1959]: E0515 10:19:23.291455 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.291482 kubelet[1959]: W0515 10:19:23.291474 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.291556 kubelet[1959]: E0515 10:19:23.291491 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.291671 kubelet[1959]: E0515 10:19:23.291655 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.291671 kubelet[1959]: W0515 10:19:23.291666 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.291746 kubelet[1959]: E0515 10:19:23.291679 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.291869 kubelet[1959]: E0515 10:19:23.291842 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.291869 kubelet[1959]: W0515 10:19:23.291854 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.291936 kubelet[1959]: E0515 10:19:23.291867 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.292079 kubelet[1959]: E0515 10:19:23.292061 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.292079 kubelet[1959]: W0515 10:19:23.292074 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.292164 kubelet[1959]: E0515 10:19:23.292089 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.294058 kubelet[1959]: E0515 10:19:23.293856 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.294058 kubelet[1959]: W0515 10:19:23.293886 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.294058 kubelet[1959]: E0515 10:19:23.293905 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.294354 kubelet[1959]: E0515 10:19:23.294243 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.294354 kubelet[1959]: W0515 10:19:23.294257 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.294354 kubelet[1959]: E0515 10:19:23.294326 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.294620 kubelet[1959]: E0515 10:19:23.294519 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.294620 kubelet[1959]: W0515 10:19:23.294530 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.294620 kubelet[1959]: E0515 10:19:23.294568 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.294997 kubelet[1959]: E0515 10:19:23.294819 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.294997 kubelet[1959]: W0515 10:19:23.294842 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.294997 kubelet[1959]: E0515 10:19:23.294939 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.295288 kubelet[1959]: E0515 10:19:23.295170 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.295288 kubelet[1959]: W0515 10:19:23.295184 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.295288 kubelet[1959]: E0515 10:19:23.295203 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.295586 kubelet[1959]: E0515 10:19:23.295448 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.295586 kubelet[1959]: W0515 10:19:23.295458 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.295586 kubelet[1959]: E0515 10:19:23.295479 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.295962 kubelet[1959]: E0515 10:19:23.295738 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.295962 kubelet[1959]: W0515 10:19:23.295749 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.295962 kubelet[1959]: E0515 10:19:23.295764 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.296181 kubelet[1959]: E0515 10:19:23.296157 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.296181 kubelet[1959]: W0515 10:19:23.296177 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.296250 kubelet[1959]: E0515 10:19:23.296194 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.296360 kubelet[1959]: E0515 10:19:23.296338 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.296360 kubelet[1959]: W0515 10:19:23.296356 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.296430 kubelet[1959]: E0515 10:19:23.296364 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.296681 kubelet[1959]: E0515 10:19:23.296663 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.296681 kubelet[1959]: W0515 10:19:23.296677 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.296774 kubelet[1959]: E0515 10:19:23.296701 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.298106 kubelet[1959]: E0515 10:19:23.298074 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.298106 kubelet[1959]: W0515 10:19:23.298099 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.298209 kubelet[1959]: E0515 10:19:23.298114 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.298463 kubelet[1959]: E0515 10:19:23.298444 1959 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:23.298502 kubelet[1959]: W0515 10:19:23.298464 1959 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:23.298502 kubelet[1959]: E0515 10:19:23.298480 1959 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:23.306000 audit[2571]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:23.306000 audit[2571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffce0a0820 a2=0 a3=1 items=0 ppid=2108 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:23.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:23.311000 audit[2571]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:23.311000 audit[2571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffce0a0820 a2=0 a3=1 items=0 ppid=2108 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:23.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:23.477248 env[1221]: time="2025-05-15T10:19:23.477193103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:23.479068 env[1221]: time="2025-05-15T10:19:23.479028225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:23.481864 env[1221]: time="2025-05-15T10:19:23.481826596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:23.483290 env[1221]: time="2025-05-15T10:19:23.483249845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:23.483871 env[1221]: time="2025-05-15T10:19:23.483804863Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 15 10:19:23.487085 env[1221]: time="2025-05-15T10:19:23.487000223Z" level=info msg="CreateContainer within sandbox \"441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:19:23.498412 env[1221]: time="2025-05-15T10:19:23.498352695Z" level=info msg="CreateContainer within sandbox \"441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"94dbfa013008c4f265f48c60637018ab1e1613057e67fc74d50a1dcefc1bdf21\"" May 15 10:19:23.498889 env[1221]: time="2025-05-15T10:19:23.498800493Z" level=info msg="StartContainer for \"94dbfa013008c4f265f48c60637018ab1e1613057e67fc74d50a1dcefc1bdf21\"" May 15 10:19:23.522539 systemd[1]: Started cri-containerd-94dbfa013008c4f265f48c60637018ab1e1613057e67fc74d50a1dcefc1bdf21.scope. May 15 10:19:23.554000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.554000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2456 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:23.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646266613031333030386334663236356634386336303633373031 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit: BPF prog-id=130 op=LOAD May 15 10:19:23.555000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2456 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:23.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646266613031333030386334663236356634386336303633373031 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.555000 audit: BPF prog-id=131 op=LOAD May 15 10:19:23.555000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2456 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:23.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646266613031333030386334663236356634386336303633373031 May 15 10:19:23.556000 audit: BPF prog-id=131 op=UNLOAD May 15 10:19:23.556000 audit: BPF prog-id=130 op=UNLOAD May 15 10:19:23.556000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:23.556000 audit: BPF prog-id=132 op=LOAD May 15 10:19:23.556000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2456 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:23.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934646266613031333030386334663236356634386336303633373031 May 15 10:19:23.601967 systemd[1]: cri-containerd-94dbfa013008c4f265f48c60637018ab1e1613057e67fc74d50a1dcefc1bdf21.scope: Deactivated successfully. May 15 10:19:23.602445 env[1221]: time="2025-05-15T10:19:23.602395747Z" level=info msg="StartContainer for \"94dbfa013008c4f265f48c60637018ab1e1613057e67fc74d50a1dcefc1bdf21\" returns successfully" May 15 10:19:23.604000 audit: BPF prog-id=132 op=UNLOAD May 15 10:19:23.630068 env[1221]: time="2025-05-15T10:19:23.630016192Z" level=info msg="shim disconnected" id=94dbfa013008c4f265f48c60637018ab1e1613057e67fc74d50a1dcefc1bdf21 May 15 10:19:23.630068 env[1221]: time="2025-05-15T10:19:23.630059160Z" level=warning msg="cleaning up after shim disconnected" id=94dbfa013008c4f265f48c60637018ab1e1613057e67fc74d50a1dcefc1bdf21 namespace=k8s.io May 15 10:19:23.630068 env[1221]: time="2025-05-15T10:19:23.630073002Z" level=info msg="cleaning up dead shim" May 15 10:19:23.636873 env[1221]: time="2025-05-15T10:19:23.636834028Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:19:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2630 runtime=io.containerd.runc.v2\n" May 15 10:19:24.193321 kubelet[1959]: E0515 10:19:24.193235 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76scb" podUID="3c40d6c0-7b50-499e-8d90-66ba3800bea7" May 15 10:19:24.237136 kubelet[1959]: E0515 10:19:24.237106 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:24.237778 kubelet[1959]: E0515 10:19:24.237755 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:24.238732 env[1221]: time="2025-05-15T10:19:24.238694748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:19:24.495549 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-94dbfa013008c4f265f48c60637018ab1e1613057e67fc74d50a1dcefc1bdf21-rootfs.mount: Deactivated successfully. May 15 10:19:25.238546 kubelet[1959]: E0515 10:19:25.238365 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:26.226417 kubelet[1959]: E0515 10:19:26.226301 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76scb" podUID="3c40d6c0-7b50-499e-8d90-66ba3800bea7" May 15 10:19:27.923494 env[1221]: time="2025-05-15T10:19:27.923444728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:27.925784 env[1221]: time="2025-05-15T10:19:27.925752462Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:27.930274 env[1221]: time="2025-05-15T10:19:27.930246874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:27.932222 env[1221]: time="2025-05-15T10:19:27.932187675Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:27.932766 env[1221]: time="2025-05-15T10:19:27.932734234Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 15 10:19:27.934897 env[1221]: time="2025-05-15T10:19:27.934868584Z" level=info msg="CreateContainer within sandbox \"441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:19:27.947577 env[1221]: time="2025-05-15T10:19:27.947528658Z" level=info msg="CreateContainer within sandbox \"441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e6c75e840c7e381f58eebcfebf25414531451d388870570105c4208560462bd5\"" May 15 10:19:27.948247 env[1221]: time="2025-05-15T10:19:27.948196835Z" level=info msg="StartContainer for \"e6c75e840c7e381f58eebcfebf25414531451d388870570105c4208560462bd5\"" May 15 10:19:27.966595 systemd[1]: Started cri-containerd-e6c75e840c7e381f58eebcfebf25414531451d388870570105c4208560462bd5.scope. May 15 10:19:27.993872 kernel: kauditd_printk_skb: 229 callbacks suppressed May 15 10:19:27.994006 kernel: audit: type=1400 audit(1747304367.990:993): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.994034 kernel: audit: type=1300 audit(1747304367.990:993): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2456 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2456 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:27.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633735653834306337653338316635386565626366656266323534 May 15 10:19:27.999038 kernel: audit: type=1327 audit(1747304367.990:993): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633735653834306337653338316635386565626366656266323534 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:28.000903 kernel: audit: type=1400 audit(1747304367.990:994): avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:28.001002 kernel: audit: type=1400 audit(1747304367.990:994): avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:28.005183 kernel: audit: type=1400 audit(1747304367.990:994): avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:28.005256 kernel: audit: type=1400 audit(1747304367.990:994): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:28.008673 kernel: audit: type=1400 audit(1747304367.990:994): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:28.008743 kernel: audit: type=1400 audit(1747304367.990:994): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:28.014001 kernel: audit: type=1400 audit(1747304367.990:994): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit: BPF prog-id=133 op=LOAD May 15 10:19:27.990000 audit[2658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2456 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:27.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633735653834306337653338316635386565626366656266323534 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.990000 audit: BPF prog-id=134 op=LOAD May 15 10:19:27.990000 audit[2658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2456 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:27.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633735653834306337653338316635386565626366656266323534 May 15 10:19:27.992000 audit: BPF prog-id=134 op=UNLOAD May 15 10:19:27.992000 audit: BPF prog-id=133 op=UNLOAD May 15 10:19:27.992000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:27.992000 audit: BPF prog-id=135 op=LOAD May 15 10:19:27.992000 audit[2658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2456 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:27.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633735653834306337653338316635386565626366656266323534 May 15 10:19:28.036013 env[1221]: time="2025-05-15T10:19:28.035903400Z" level=info msg="StartContainer for \"e6c75e840c7e381f58eebcfebf25414531451d388870570105c4208560462bd5\" returns successfully" May 15 10:19:28.192192 kubelet[1959]: E0515 10:19:28.192074 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-76scb" podUID="3c40d6c0-7b50-499e-8d90-66ba3800bea7" May 15 10:19:28.245466 kubelet[1959]: E0515 10:19:28.245433 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:28.609543 env[1221]: time="2025-05-15T10:19:28.609488457Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:19:28.611889 systemd[1]: cri-containerd-e6c75e840c7e381f58eebcfebf25414531451d388870570105c4208560462bd5.scope: Deactivated successfully. May 15 10:19:28.617000 audit: BPF prog-id=135 op=UNLOAD May 15 10:19:28.629523 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e6c75e840c7e381f58eebcfebf25414531451d388870570105c4208560462bd5-rootfs.mount: Deactivated successfully. May 15 10:19:28.652355 env[1221]: time="2025-05-15T10:19:28.652284463Z" level=info msg="shim disconnected" id=e6c75e840c7e381f58eebcfebf25414531451d388870570105c4208560462bd5 May 15 10:19:28.652355 env[1221]: time="2025-05-15T10:19:28.652342951Z" level=warning msg="cleaning up after shim disconnected" id=e6c75e840c7e381f58eebcfebf25414531451d388870570105c4208560462bd5 namespace=k8s.io May 15 10:19:28.652355 env[1221]: time="2025-05-15T10:19:28.652354352Z" level=info msg="cleaning up dead shim" May 15 10:19:28.662849 env[1221]: time="2025-05-15T10:19:28.662803679Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:19:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2698 runtime=io.containerd.runc.v2\n" May 15 10:19:28.665358 kubelet[1959]: I0515 10:19:28.665330 1959 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 15 10:19:28.700374 systemd[1]: Created slice kubepods-burstable-podf9568ad1_e01e_4fc3_9e6b_8060a82abcb8.slice. May 15 10:19:28.706078 systemd[1]: Created slice kubepods-besteffort-podab7b7c44_1e90_4685_90d5_9a8c91357fbd.slice. May 15 10:19:28.710046 systemd[1]: Created slice kubepods-burstable-pod30eb1573_ab57_40ef_b9fa_ed1521a014a6.slice. May 15 10:19:28.718866 systemd[1]: Created slice kubepods-besteffort-pod9b12bc62_9412_4685_b095_bcca74cee564.slice. May 15 10:19:28.723427 systemd[1]: Created slice kubepods-besteffort-pod66389d50_bf1d_4173_a03c_8eca0974a0aa.slice. May 15 10:19:28.728203 systemd[1]: Created slice kubepods-besteffort-pod8b88ee4d_c3b4_4f30_b96e_f1e11842e59b.slice. May 15 10:19:28.738834 kubelet[1959]: I0515 10:19:28.738797 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n799l\" (UniqueName: \"kubernetes.io/projected/9b12bc62-9412-4685-b095-bcca74cee564-kube-api-access-n799l\") pod \"calico-apiserver-7d86bbcd9d-t2rkl\" (UID: \"9b12bc62-9412-4685-b095-bcca74cee564\") " pod="calico-apiserver/calico-apiserver-7d86bbcd9d-t2rkl" May 15 10:19:28.739038 kubelet[1959]: I0515 10:19:28.739019 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f9568ad1-e01e-4fc3-9e6b-8060a82abcb8-config-volume\") pod \"coredns-668d6bf9bc-gfgp6\" (UID: \"f9568ad1-e01e-4fc3-9e6b-8060a82abcb8\") " pod="kube-system/coredns-668d6bf9bc-gfgp6" May 15 10:19:28.739131 kubelet[1959]: I0515 10:19:28.739115 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8b88ee4d-c3b4-4f30-b96e-f1e11842e59b-calico-apiserver-certs\") pod \"calico-apiserver-7d86bbcd9d-bbdtt\" (UID: \"8b88ee4d-c3b4-4f30-b96e-f1e11842e59b\") " pod="calico-apiserver/calico-apiserver-7d86bbcd9d-bbdtt" May 15 10:19:28.739206 kubelet[1959]: I0515 10:19:28.739193 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t65k6\" (UniqueName: \"kubernetes.io/projected/f9568ad1-e01e-4fc3-9e6b-8060a82abcb8-kube-api-access-t65k6\") pod \"coredns-668d6bf9bc-gfgp6\" (UID: \"f9568ad1-e01e-4fc3-9e6b-8060a82abcb8\") " pod="kube-system/coredns-668d6bf9bc-gfgp6" May 15 10:19:28.739308 kubelet[1959]: I0515 10:19:28.739293 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pmng8\" (UniqueName: \"kubernetes.io/projected/8b88ee4d-c3b4-4f30-b96e-f1e11842e59b-kube-api-access-pmng8\") pod \"calico-apiserver-7d86bbcd9d-bbdtt\" (UID: \"8b88ee4d-c3b4-4f30-b96e-f1e11842e59b\") " pod="calico-apiserver/calico-apiserver-7d86bbcd9d-bbdtt" May 15 10:19:28.739459 kubelet[1959]: I0515 10:19:28.739420 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9b12bc62-9412-4685-b095-bcca74cee564-calico-apiserver-certs\") pod \"calico-apiserver-7d86bbcd9d-t2rkl\" (UID: \"9b12bc62-9412-4685-b095-bcca74cee564\") " pod="calico-apiserver/calico-apiserver-7d86bbcd9d-t2rkl" May 15 10:19:28.840568 kubelet[1959]: I0515 10:19:28.840527 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gmjd8\" (UniqueName: \"kubernetes.io/projected/30eb1573-ab57-40ef-b9fa-ed1521a014a6-kube-api-access-gmjd8\") pod \"coredns-668d6bf9bc-tkzfl\" (UID: \"30eb1573-ab57-40ef-b9fa-ed1521a014a6\") " pod="kube-system/coredns-668d6bf9bc-tkzfl" May 15 10:19:28.840806 kubelet[1959]: I0515 10:19:28.840786 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/30eb1573-ab57-40ef-b9fa-ed1521a014a6-config-volume\") pod \"coredns-668d6bf9bc-tkzfl\" (UID: \"30eb1573-ab57-40ef-b9fa-ed1521a014a6\") " pod="kube-system/coredns-668d6bf9bc-tkzfl" May 15 10:19:28.840943 kubelet[1959]: I0515 10:19:28.840927 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/66389d50-bf1d-4173-a03c-8eca0974a0aa-tigera-ca-bundle\") pod \"calico-kube-controllers-7f98dd9fcb-7tgjn\" (UID: \"66389d50-bf1d-4173-a03c-8eca0974a0aa\") " pod="calico-system/calico-kube-controllers-7f98dd9fcb-7tgjn" May 15 10:19:28.841050 kubelet[1959]: I0515 10:19:28.841033 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-28bqq\" (UniqueName: \"kubernetes.io/projected/66389d50-bf1d-4173-a03c-8eca0974a0aa-kube-api-access-28bqq\") pod \"calico-kube-controllers-7f98dd9fcb-7tgjn\" (UID: \"66389d50-bf1d-4173-a03c-8eca0974a0aa\") " pod="calico-system/calico-kube-controllers-7f98dd9fcb-7tgjn" May 15 10:19:28.841168 kubelet[1959]: I0515 10:19:28.841150 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ab7b7c44-1e90-4685-90d5-9a8c91357fbd-calico-apiserver-certs\") pod \"calico-apiserver-78d645f96f-nfvxb\" (UID: \"ab7b7c44-1e90-4685-90d5-9a8c91357fbd\") " pod="calico-apiserver/calico-apiserver-78d645f96f-nfvxb" May 15 10:19:28.841253 kubelet[1959]: I0515 10:19:28.841239 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9xgh\" (UniqueName: \"kubernetes.io/projected/ab7b7c44-1e90-4685-90d5-9a8c91357fbd-kube-api-access-v9xgh\") pod \"calico-apiserver-78d645f96f-nfvxb\" (UID: \"ab7b7c44-1e90-4685-90d5-9a8c91357fbd\") " pod="calico-apiserver/calico-apiserver-78d645f96f-nfvxb" May 15 10:19:29.003400 kubelet[1959]: E0515 10:19:29.003356 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:29.004286 env[1221]: time="2025-05-15T10:19:29.004244021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gfgp6,Uid:f9568ad1-e01e-4fc3-9e6b-8060a82abcb8,Namespace:kube-system,Attempt:0,}" May 15 10:19:29.013303 env[1221]: time="2025-05-15T10:19:29.013251853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78d645f96f-nfvxb,Uid:ab7b7c44-1e90-4685-90d5-9a8c91357fbd,Namespace:calico-apiserver,Attempt:0,}" May 15 10:19:29.016600 kubelet[1959]: E0515 10:19:29.016571 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:29.017636 env[1221]: time="2025-05-15T10:19:29.017353676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-tkzfl,Uid:30eb1573-ab57-40ef-b9fa-ed1521a014a6,Namespace:kube-system,Attempt:0,}" May 15 10:19:29.024779 env[1221]: time="2025-05-15T10:19:29.024401089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d86bbcd9d-t2rkl,Uid:9b12bc62-9412-4685-b095-bcca74cee564,Namespace:calico-apiserver,Attempt:0,}" May 15 10:19:29.027857 env[1221]: time="2025-05-15T10:19:29.027671202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f98dd9fcb-7tgjn,Uid:66389d50-bf1d-4173-a03c-8eca0974a0aa,Namespace:calico-system,Attempt:0,}" May 15 10:19:29.030573 env[1221]: time="2025-05-15T10:19:29.030537862Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d86bbcd9d-bbdtt,Uid:8b88ee4d-c3b4-4f30-b96e-f1e11842e59b,Namespace:calico-apiserver,Attempt:0,}" May 15 10:19:29.258043 kubelet[1959]: E0515 10:19:29.256542 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:29.270162 env[1221]: time="2025-05-15T10:19:29.270106498Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:19:29.337869 env[1221]: time="2025-05-15T10:19:29.337775177Z" level=error msg="Failed to destroy network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.338209 env[1221]: time="2025-05-15T10:19:29.338166749Z" level=error msg="encountered an error cleaning up failed sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.338252 env[1221]: time="2025-05-15T10:19:29.338226237Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78d645f96f-nfvxb,Uid:ab7b7c44-1e90-4685-90d5-9a8c91357fbd,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.339350 kubelet[1959]: E0515 10:19:29.339222 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.341915 kubelet[1959]: E0515 10:19:29.341505 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78d645f96f-nfvxb" May 15 10:19:29.341915 kubelet[1959]: E0515 10:19:29.341562 1959 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78d645f96f-nfvxb" May 15 10:19:29.341915 kubelet[1959]: E0515 10:19:29.341615 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-78d645f96f-nfvxb_calico-apiserver(ab7b7c44-1e90-4685-90d5-9a8c91357fbd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-78d645f96f-nfvxb_calico-apiserver(ab7b7c44-1e90-4685-90d5-9a8c91357fbd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78d645f96f-nfvxb" podUID="ab7b7c44-1e90-4685-90d5-9a8c91357fbd" May 15 10:19:29.342260 env[1221]: time="2025-05-15T10:19:29.342216365Z" level=error msg="Failed to destroy network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.342725 env[1221]: time="2025-05-15T10:19:29.342677346Z" level=error msg="encountered an error cleaning up failed sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.342862 env[1221]: time="2025-05-15T10:19:29.342833447Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gfgp6,Uid:f9568ad1-e01e-4fc3-9e6b-8060a82abcb8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.343226 kubelet[1959]: E0515 10:19:29.343088 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.343226 kubelet[1959]: E0515 10:19:29.343126 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-gfgp6" May 15 10:19:29.343226 kubelet[1959]: E0515 10:19:29.343144 1959 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-gfgp6" May 15 10:19:29.343361 kubelet[1959]: E0515 10:19:29.343171 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-gfgp6_kube-system(f9568ad1-e01e-4fc3-9e6b-8060a82abcb8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-gfgp6_kube-system(f9568ad1-e01e-4fc3-9e6b-8060a82abcb8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-gfgp6" podUID="f9568ad1-e01e-4fc3-9e6b-8060a82abcb8" May 15 10:19:29.346038 env[1221]: time="2025-05-15T10:19:29.345995065Z" level=error msg="Failed to destroy network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.346500 env[1221]: time="2025-05-15T10:19:29.346463087Z" level=error msg="encountered an error cleaning up failed sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.346813 env[1221]: time="2025-05-15T10:19:29.346600345Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d86bbcd9d-bbdtt,Uid:8b88ee4d-c3b4-4f30-b96e-f1e11842e59b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.347434 kubelet[1959]: E0515 10:19:29.347164 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.347434 kubelet[1959]: E0515 10:19:29.347203 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-bbdtt" May 15 10:19:29.347434 kubelet[1959]: E0515 10:19:29.347218 1959 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-bbdtt" May 15 10:19:29.347566 kubelet[1959]: E0515 10:19:29.347251 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7d86bbcd9d-bbdtt_calico-apiserver(8b88ee4d-c3b4-4f30-b96e-f1e11842e59b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7d86bbcd9d-bbdtt_calico-apiserver(8b88ee4d-c3b4-4f30-b96e-f1e11842e59b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-bbdtt" podUID="8b88ee4d-c3b4-4f30-b96e-f1e11842e59b" May 15 10:19:29.352529 env[1221]: time="2025-05-15T10:19:29.352484724Z" level=error msg="Failed to destroy network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.352850 env[1221]: time="2025-05-15T10:19:29.352813888Z" level=error msg="encountered an error cleaning up failed sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.352913 env[1221]: time="2025-05-15T10:19:29.352863014Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f98dd9fcb-7tgjn,Uid:66389d50-bf1d-4173-a03c-8eca0974a0aa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.353407 kubelet[1959]: E0515 10:19:29.353090 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.353407 kubelet[1959]: E0515 10:19:29.353129 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7f98dd9fcb-7tgjn" May 15 10:19:29.353407 kubelet[1959]: E0515 10:19:29.353144 1959 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7f98dd9fcb-7tgjn" May 15 10:19:29.353542 kubelet[1959]: E0515 10:19:29.353189 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7f98dd9fcb-7tgjn_calico-system(66389d50-bf1d-4173-a03c-8eca0974a0aa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7f98dd9fcb-7tgjn_calico-system(66389d50-bf1d-4173-a03c-8eca0974a0aa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7f98dd9fcb-7tgjn" podUID="66389d50-bf1d-4173-a03c-8eca0974a0aa" May 15 10:19:29.354472 env[1221]: time="2025-05-15T10:19:29.354431462Z" level=error msg="Failed to destroy network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.354791 env[1221]: time="2025-05-15T10:19:29.354760426Z" level=error msg="encountered an error cleaning up failed sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.354840 env[1221]: time="2025-05-15T10:19:29.354810152Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-tkzfl,Uid:30eb1573-ab57-40ef-b9fa-ed1521a014a6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.355144 kubelet[1959]: E0515 10:19:29.354962 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.355144 kubelet[1959]: E0515 10:19:29.355043 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-tkzfl" May 15 10:19:29.355144 kubelet[1959]: E0515 10:19:29.355060 1959 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-tkzfl" May 15 10:19:29.355280 kubelet[1959]: E0515 10:19:29.355099 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-tkzfl_kube-system(30eb1573-ab57-40ef-b9fa-ed1521a014a6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-tkzfl_kube-system(30eb1573-ab57-40ef-b9fa-ed1521a014a6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-tkzfl" podUID="30eb1573-ab57-40ef-b9fa-ed1521a014a6" May 15 10:19:29.359615 env[1221]: time="2025-05-15T10:19:29.359565422Z" level=error msg="Failed to destroy network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.359922 env[1221]: time="2025-05-15T10:19:29.359891625Z" level=error msg="encountered an error cleaning up failed sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.360010 env[1221]: time="2025-05-15T10:19:29.359942912Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d86bbcd9d-t2rkl,Uid:9b12bc62-9412-4685-b095-bcca74cee564,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.360492 kubelet[1959]: E0515 10:19:29.360164 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:29.360492 kubelet[1959]: E0515 10:19:29.360216 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-t2rkl" May 15 10:19:29.360492 kubelet[1959]: E0515 10:19:29.360233 1959 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-t2rkl" May 15 10:19:29.360633 kubelet[1959]: E0515 10:19:29.360273 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7d86bbcd9d-t2rkl_calico-apiserver(9b12bc62-9412-4685-b095-bcca74cee564)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7d86bbcd9d-t2rkl_calico-apiserver(9b12bc62-9412-4685-b095-bcca74cee564)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-t2rkl" podUID="9b12bc62-9412-4685-b095-bcca74cee564" May 15 10:19:30.198838 systemd[1]: Created slice kubepods-besteffort-pod3c40d6c0_7b50_499e_8d90_66ba3800bea7.slice. May 15 10:19:30.201542 env[1221]: time="2025-05-15T10:19:30.201492229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76scb,Uid:3c40d6c0-7b50-499e-8d90-66ba3800bea7,Namespace:calico-system,Attempt:0,}" May 15 10:19:30.259859 kubelet[1959]: I0515 10:19:30.259792 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:19:30.261360 env[1221]: time="2025-05-15T10:19:30.261295847Z" level=info msg="StopPodSandbox for \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\"" May 15 10:19:30.262821 kubelet[1959]: I0515 10:19:30.262423 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:19:30.262916 env[1221]: time="2025-05-15T10:19:30.262893769Z" level=info msg="StopPodSandbox for \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\"" May 15 10:19:30.265687 kubelet[1959]: I0515 10:19:30.265488 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:19:30.266409 env[1221]: time="2025-05-15T10:19:30.266375130Z" level=info msg="StopPodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\"" May 15 10:19:30.269997 kubelet[1959]: I0515 10:19:30.269193 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:19:30.270076 env[1221]: time="2025-05-15T10:19:30.269868093Z" level=info msg="StopPodSandbox for \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\"" May 15 10:19:30.272032 kubelet[1959]: I0515 10:19:30.271665 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:19:30.272135 env[1221]: time="2025-05-15T10:19:30.272102576Z" level=info msg="StopPodSandbox for \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\"" May 15 10:19:30.273455 kubelet[1959]: I0515 10:19:30.273119 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:19:30.273735 env[1221]: time="2025-05-15T10:19:30.273704899Z" level=info msg="StopPodSandbox for \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\"" May 15 10:19:30.277772 env[1221]: time="2025-05-15T10:19:30.277706926Z" level=error msg="Failed to destroy network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.280633 env[1221]: time="2025-05-15T10:19:30.278076653Z" level=error msg="encountered an error cleaning up failed sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.280633 env[1221]: time="2025-05-15T10:19:30.278127979Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76scb,Uid:3c40d6c0-7b50-499e-8d90-66ba3800bea7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.279861 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5-shm.mount: Deactivated successfully. May 15 10:19:30.280788 kubelet[1959]: E0515 10:19:30.279258 1959 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.280788 kubelet[1959]: E0515 10:19:30.279301 1959 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-76scb" May 15 10:19:30.280788 kubelet[1959]: E0515 10:19:30.279332 1959 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-76scb" May 15 10:19:30.280897 kubelet[1959]: E0515 10:19:30.279366 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-76scb_calico-system(3c40d6c0-7b50-499e-8d90-66ba3800bea7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-76scb_calico-system(3c40d6c0-7b50-499e-8d90-66ba3800bea7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-76scb" podUID="3c40d6c0-7b50-499e-8d90-66ba3800bea7" May 15 10:19:30.315293 env[1221]: time="2025-05-15T10:19:30.315229560Z" level=error msg="StopPodSandbox for \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\" failed" error="failed to destroy network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.315571 kubelet[1959]: E0515 10:19:30.315509 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:19:30.315639 kubelet[1959]: E0515 10:19:30.315592 1959 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef"} May 15 10:19:30.315669 kubelet[1959]: E0515 10:19:30.315659 1959 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"30eb1573-ab57-40ef-b9fa-ed1521a014a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:30.315722 kubelet[1959]: E0515 10:19:30.315681 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"30eb1573-ab57-40ef-b9fa-ed1521a014a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-tkzfl" podUID="30eb1573-ab57-40ef-b9fa-ed1521a014a6" May 15 10:19:30.322240 env[1221]: time="2025-05-15T10:19:30.322183481Z" level=error msg="StopPodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" failed" error="failed to destroy network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.322608 kubelet[1959]: E0515 10:19:30.322466 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:19:30.322608 kubelet[1959]: E0515 10:19:30.322519 1959 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c"} May 15 10:19:30.322608 kubelet[1959]: E0515 10:19:30.322557 1959 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9b12bc62-9412-4685-b095-bcca74cee564\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:30.322608 kubelet[1959]: E0515 10:19:30.322578 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9b12bc62-9412-4685-b095-bcca74cee564\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-t2rkl" podUID="9b12bc62-9412-4685-b095-bcca74cee564" May 15 10:19:30.335923 env[1221]: time="2025-05-15T10:19:30.335860374Z" level=error msg="StopPodSandbox for \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\" failed" error="failed to destroy network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.336163 kubelet[1959]: E0515 10:19:30.336121 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:19:30.336222 kubelet[1959]: E0515 10:19:30.336182 1959 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae"} May 15 10:19:30.336248 kubelet[1959]: E0515 10:19:30.336213 1959 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"66389d50-bf1d-4173-a03c-8eca0974a0aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:30.336299 kubelet[1959]: E0515 10:19:30.336250 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"66389d50-bf1d-4173-a03c-8eca0974a0aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7f98dd9fcb-7tgjn" podUID="66389d50-bf1d-4173-a03c-8eca0974a0aa" May 15 10:19:30.338345 env[1221]: time="2025-05-15T10:19:30.338303724Z" level=error msg="StopPodSandbox for \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\" failed" error="failed to destroy network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.338721 kubelet[1959]: E0515 10:19:30.338590 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:19:30.338721 kubelet[1959]: E0515 10:19:30.338635 1959 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88"} May 15 10:19:30.338721 kubelet[1959]: E0515 10:19:30.338663 1959 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8b88ee4d-c3b4-4f30-b96e-f1e11842e59b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:30.338721 kubelet[1959]: E0515 10:19:30.338683 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8b88ee4d-c3b4-4f30-b96e-f1e11842e59b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-bbdtt" podUID="8b88ee4d-c3b4-4f30-b96e-f1e11842e59b" May 15 10:19:30.340179 env[1221]: time="2025-05-15T10:19:30.340137276Z" level=error msg="StopPodSandbox for \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\" failed" error="failed to destroy network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.340485 kubelet[1959]: E0515 10:19:30.340441 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:19:30.340543 kubelet[1959]: E0515 10:19:30.340484 1959 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e"} May 15 10:19:30.340543 kubelet[1959]: E0515 10:19:30.340530 1959 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f9568ad1-e01e-4fc3-9e6b-8060a82abcb8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:30.340624 kubelet[1959]: E0515 10:19:30.340549 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f9568ad1-e01e-4fc3-9e6b-8060a82abcb8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-gfgp6" podUID="f9568ad1-e01e-4fc3-9e6b-8060a82abcb8" May 15 10:19:30.345898 env[1221]: time="2025-05-15T10:19:30.345850920Z" level=error msg="StopPodSandbox for \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\" failed" error="failed to destroy network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:30.346151 kubelet[1959]: E0515 10:19:30.346091 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:19:30.346210 kubelet[1959]: E0515 10:19:30.346153 1959 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf"} May 15 10:19:30.346210 kubelet[1959]: E0515 10:19:30.346195 1959 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ab7b7c44-1e90-4685-90d5-9a8c91357fbd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:30.346284 kubelet[1959]: E0515 10:19:30.346214 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ab7b7c44-1e90-4685-90d5-9a8c91357fbd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78d645f96f-nfvxb" podUID="ab7b7c44-1e90-4685-90d5-9a8c91357fbd" May 15 10:19:31.275710 kubelet[1959]: I0515 10:19:31.275683 1959 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:19:31.276374 env[1221]: time="2025-05-15T10:19:31.276340188Z" level=info msg="StopPodSandbox for \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\"" May 15 10:19:31.303687 env[1221]: time="2025-05-15T10:19:31.303631060Z" level=error msg="StopPodSandbox for \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\" failed" error="failed to destroy network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:31.304081 kubelet[1959]: E0515 10:19:31.304011 1959 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:19:31.304081 kubelet[1959]: E0515 10:19:31.304062 1959 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5"} May 15 10:19:31.304422 kubelet[1959]: E0515 10:19:31.304094 1959 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3c40d6c0-7b50-499e-8d90-66ba3800bea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:31.304422 kubelet[1959]: E0515 10:19:31.304120 1959 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3c40d6c0-7b50-499e-8d90-66ba3800bea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-76scb" podUID="3c40d6c0-7b50-499e-8d90-66ba3800bea7" May 15 10:19:34.622763 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2783780686.mount: Deactivated successfully. May 15 10:19:34.882216 env[1221]: time="2025-05-15T10:19:34.882085759Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:34.883798 env[1221]: time="2025-05-15T10:19:34.883764339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:34.886249 env[1221]: time="2025-05-15T10:19:34.886222403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:34.888868 env[1221]: time="2025-05-15T10:19:34.888835923Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:34.889647 env[1221]: time="2025-05-15T10:19:34.889332817Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 15 10:19:34.911307 systemd[1]: Started sshd@7-10.0.0.84:22-10.0.0.1:50020.service. May 15 10:19:34.912089 env[1221]: time="2025-05-15T10:19:34.911863834Z" level=info msg="CreateContainer within sandbox \"441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:19:34.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.84:22-10.0.0.1:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:34.916019 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 10:19:34.916130 kernel: audit: type=1130 audit(1747304374.910:1000): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.84:22-10.0.0.1:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:34.971000 audit[3154]: USER_ACCT pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:34.972592 sshd[3154]: Accepted publickey for core from 10.0.0.1 port 50020 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:34.975002 kernel: audit: type=1101 audit(1747304374.971:1001): pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:34.978000 audit[3154]: CRED_ACQ pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:34.980817 sshd[3154]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:34.984115 kernel: audit: type=1103 audit(1747304374.978:1002): pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:34.984215 kernel: audit: type=1006 audit(1747304374.979:1003): pid=3154 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 15 10:19:34.979000 audit[3154]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc962a4e0 a2=3 a3=1 items=0 ppid=1 pid=3154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.987017 kernel: audit: type=1300 audit(1747304374.979:1003): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc962a4e0 a2=3 a3=1 items=0 ppid=1 pid=3154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.979000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:19:34.988283 kernel: audit: type=1327 audit(1747304374.979:1003): proctitle=737368643A20636F7265205B707269765D May 15 10:19:34.989837 systemd-logind[1207]: New session 8 of user core. May 15 10:19:34.990875 systemd[1]: Started session-8.scope. May 15 10:19:34.999000 audit[3154]: USER_START pid=3154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:35.000000 audit[3156]: CRED_ACQ pid=3156 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:35.005779 kernel: audit: type=1105 audit(1747304374.999:1004): pid=3154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:35.005861 kernel: audit: type=1103 audit(1747304375.000:1005): pid=3156 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:35.033473 env[1221]: time="2025-05-15T10:19:35.033407300Z" level=info msg="CreateContainer within sandbox \"441d8eb3f3be7675db3fb38f667b0ed0a5cfc50c786ea65b48a6d7d4727e371d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"65a93ddac7be5ca0ab552de2387bd218382689865bf99a2ea0252d6640e85414\"" May 15 10:19:35.035423 env[1221]: time="2025-05-15T10:19:35.034257548Z" level=info msg="StartContainer for \"65a93ddac7be5ca0ab552de2387bd218382689865bf99a2ea0252d6640e85414\"" May 15 10:19:35.060479 systemd[1]: Started cri-containerd-65a93ddac7be5ca0ab552de2387bd218382689865bf99a2ea0252d6640e85414.scope. May 15 10:19:35.089000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2456 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:35.095518 kernel: audit: type=1400 audit(1747304375.089:1006): avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.095620 kernel: audit: type=1300 audit(1747304375.089:1006): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2456 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:35.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613933646461633762653563613061623535326465323338376264 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.089000 audit: BPF prog-id=136 op=LOAD May 15 10:19:35.089000 audit[3164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2456 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:35.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613933646461633762653563613061623535326465323338376264 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.090000 audit: BPF prog-id=137 op=LOAD May 15 10:19:35.090000 audit[3164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2456 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:35.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613933646461633762653563613061623535326465323338376264 May 15 10:19:35.091000 audit: BPF prog-id=137 op=UNLOAD May 15 10:19:35.091000 audit: BPF prog-id=136 op=UNLOAD May 15 10:19:35.091000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { perfmon } for pid=3164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit[3164]: AVC avc: denied { bpf } for pid=3164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:35.091000 audit: BPF prog-id=138 op=LOAD May 15 10:19:35.091000 audit[3164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2456 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:35.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613933646461633762653563613061623535326465323338376264 May 15 10:19:35.143247 env[1221]: time="2025-05-15T10:19:35.143138141Z" level=info msg="StartContainer for \"65a93ddac7be5ca0ab552de2387bd218382689865bf99a2ea0252d6640e85414\" returns successfully" May 15 10:19:35.203300 sshd[3154]: pam_unix(sshd:session): session closed for user core May 15 10:19:35.203000 audit[3154]: USER_END pid=3154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:35.203000 audit[3154]: CRED_DISP pid=3154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:35.207227 systemd[1]: sshd@7-10.0.0.84:22-10.0.0.1:50020.service: Deactivated successfully. May 15 10:19:35.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.84:22-10.0.0.1:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:35.208063 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:19:35.208634 systemd-logind[1207]: Session 8 logged out. Waiting for processes to exit. May 15 10:19:35.211199 systemd-logind[1207]: Removed session 8. May 15 10:19:35.289394 kubelet[1959]: E0515 10:19:35.289351 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:35.292357 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:19:35.292428 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:19:36.290958 kubelet[1959]: E0515 10:19:36.290923 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:36.567000 audit[3324]: AVC avc: denied { write } for pid=3324 comm="tee" name="fd" dev="proc" ino=20495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:36.567000 audit[3324]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4341a2a a2=241 a3=1b6 items=1 ppid=3287 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.567000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:19:36.567000 audit: PATH item=0 name="/dev/fd/63" inode=17257 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:36.567000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:36.573000 audit[3335]: AVC avc: denied { write } for pid=3335 comm="tee" name="fd" dev="proc" ino=19138 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:36.573000 audit[3335]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff69f4a2a a2=241 a3=1b6 items=1 ppid=3296 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.573000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:19:36.573000 audit: PATH item=0 name="/dev/fd/63" inode=17260 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:36.573000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:36.573000 audit[3340]: AVC avc: denied { write } for pid=3340 comm="tee" name="fd" dev="proc" ino=17265 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:36.573000 audit[3340]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4cc2a2a a2=241 a3=1b6 items=1 ppid=3288 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.573000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:19:36.573000 audit: PATH item=0 name="/dev/fd/63" inode=20485 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:36.573000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:36.600000 audit[3363]: AVC avc: denied { write } for pid=3363 comm="tee" name="fd" dev="proc" ino=19144 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:36.600000 audit[3363]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd7d96a2b a2=241 a3=1b6 items=1 ppid=3290 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.600000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:19:36.600000 audit: PATH item=0 name="/dev/fd/63" inode=19587 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:36.600000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:36.607000 audit[3359]: AVC avc: denied { write } for pid=3359 comm="tee" name="fd" dev="proc" ino=17275 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:36.617000 audit[3356]: AVC avc: denied { write } for pid=3356 comm="tee" name="fd" dev="proc" ino=17280 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:36.607000 audit[3359]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffebf88a1a a2=241 a3=1b6 items=1 ppid=3292 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.607000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:19:36.607000 audit: PATH item=0 name="/dev/fd/63" inode=19584 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:36.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:36.617000 audit[3356]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeaa23a1b a2=241 a3=1b6 items=1 ppid=3301 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.617000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:19:36.617000 audit: PATH item=0 name="/dev/fd/63" inode=19135 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:36.617000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:36.647000 audit[3374]: AVC avc: denied { write } for pid=3374 comm="tee" name="fd" dev="proc" ino=17288 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:36.647000 audit[3374]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef834a2c a2=241 a3=1b6 items=1 ppid=3295 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.647000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:19:36.647000 audit: PATH item=0 name="/dev/fd/63" inode=20497 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:36.647000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit: BPF prog-id=139 op=LOAD May 15 10:19:36.693000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffec179c58 a2=98 a3=ffffec179c48 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.693000 audit: BPF prog-id=139 op=UNLOAD May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit: BPF prog-id=140 op=LOAD May 15 10:19:36.693000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffec1798e8 a2=74 a3=95 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.693000 audit: BPF prog-id=140 op=UNLOAD May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.693000 audit: BPF prog-id=141 op=LOAD May 15 10:19:36.693000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffec179948 a2=94 a3=2 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.693000 audit: BPF prog-id=141 op=UNLOAD May 15 10:19:36.787000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit: BPF prog-id=142 op=LOAD May 15 10:19:36.787000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffec179908 a2=40 a3=ffffec179938 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.787000 audit: BPF prog-id=142 op=UNLOAD May 15 10:19:36.787000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.787000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffec179a20 a2=50 a3=0 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffec179978 a2=28 a3=ffffec179aa8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffec1799a8 a2=28 a3=ffffec179ad8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffec179858 a2=28 a3=ffffec179988 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffec1799c8 a2=28 a3=ffffec179af8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffec1799a8 a2=28 a3=ffffec179ad8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffec179998 a2=28 a3=ffffec179ac8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffec1799c8 a2=28 a3=ffffec179af8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffec1799a8 a2=28 a3=ffffec179ad8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffec1799c8 a2=28 a3=ffffec179af8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffec179998 a2=28 a3=ffffec179ac8 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffec179a18 a2=28 a3=ffffec179b58 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffec179750 a2=50 a3=0 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit: BPF prog-id=143 op=LOAD May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffec179758 a2=94 a3=5 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit: BPF prog-id=143 op=UNLOAD May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffec179860 a2=50 a3=0 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffec1799a8 a2=4 a3=3 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.796000 audit[3389]: AVC avc: denied { confidentiality } for pid=3389 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:36.796000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffec179988 a2=94 a3=6 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.796000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.797000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { confidentiality } for pid=3389 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:36.797000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffec179158 a2=94 a3=83 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.797000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.797000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.797000 audit[3389]: AVC avc: denied { confidentiality } for pid=3389 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:36.797000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffec179158 a2=94 a3=83 items=0 ppid=3299 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.797000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit: BPF prog-id=144 op=LOAD May 15 10:19:36.807000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd4bdede8 a2=98 a3=ffffd4bdedd8 items=0 ppid=3299 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.807000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:19:36.807000 audit: BPF prog-id=144 op=UNLOAD May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit: BPF prog-id=145 op=LOAD May 15 10:19:36.807000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd4bdec98 a2=74 a3=95 items=0 ppid=3299 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.807000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:19:36.807000 audit: BPF prog-id=145 op=UNLOAD May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.807000 audit: BPF prog-id=146 op=LOAD May 15 10:19:36.807000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd4bdecc8 a2=40 a3=ffffd4bdecf8 items=0 ppid=3299 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.807000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:19:36.807000 audit: BPF prog-id=146 op=UNLOAD May 15 10:19:36.859072 systemd-networkd[1047]: vxlan.calico: Link UP May 15 10:19:36.859080 systemd-networkd[1047]: vxlan.calico: Gained carrier May 15 10:19:36.887000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.887000 audit: BPF prog-id=147 op=LOAD May 15 10:19:36.887000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7286718 a2=98 a3=ffffc7286708 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.888000 audit: BPF prog-id=147 op=UNLOAD May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit: BPF prog-id=148 op=LOAD May 15 10:19:36.888000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc72863f8 a2=74 a3=95 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.888000 audit: BPF prog-id=148 op=UNLOAD May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit: BPF prog-id=149 op=LOAD May 15 10:19:36.888000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7286458 a2=94 a3=2 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.888000 audit: BPF prog-id=149 op=UNLOAD May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7286488 a2=28 a3=ffffc72865b8 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.888000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.888000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc72864b8 a2=28 a3=ffffc72865e8 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7286368 a2=28 a3=ffffc7286498 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc72864d8 a2=28 a3=ffffc7286608 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc72864b8 a2=28 a3=ffffc72865e8 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc72864a8 a2=28 a3=ffffc72865d8 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc72864d8 a2=28 a3=ffffc7286608 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc72864b8 a2=28 a3=ffffc72865e8 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc72864d8 a2=28 a3=ffffc7286608 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc72864a8 a2=28 a3=ffffc72865d8 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffc7286528 a2=28 a3=ffffc7286668 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit: BPF prog-id=150 op=LOAD May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7286348 a2=40 a3=ffffc7286378 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.889000 audit: BPF prog-id=150 op=UNLOAD May 15 10:19:36.889000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.889000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc7286370 a2=50 a3=0 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.889000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffc7286370 a2=50 a3=0 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.890000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit: BPF prog-id=151 op=LOAD May 15 10:19:36.890000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7285ad8 a2=94 a3=2 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.890000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.890000 audit: BPF prog-id=151 op=UNLOAD May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { perfmon } for pid=3440 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit[3440]: AVC avc: denied { bpf } for pid=3440 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.890000 audit: BPF prog-id=152 op=LOAD May 15 10:19:36.890000 audit[3440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7285c68 a2=94 a3=30 items=0 ppid=3299 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.890000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.895000 audit: BPF prog-id=153 op=LOAD May 15 10:19:36.895000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff53a0f58 a2=98 a3=fffff53a0f48 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.895000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.895000 audit: BPF prog-id=153 op=UNLOAD May 15 10:19:36.896000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit: BPF prog-id=154 op=LOAD May 15 10:19:36.896000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff53a0be8 a2=74 a3=95 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.896000 audit: BPF prog-id=154 op=UNLOAD May 15 10:19:36.896000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.896000 audit: BPF prog-id=155 op=LOAD May 15 10:19:36.896000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff53a0c48 a2=94 a3=2 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.896000 audit: BPF prog-id=155 op=UNLOAD May 15 10:19:36.981000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit: BPF prog-id=156 op=LOAD May 15 10:19:36.981000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff53a0c08 a2=40 a3=fffff53a0c38 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.981000 audit: BPF prog-id=156 op=UNLOAD May 15 10:19:36.981000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.981000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff53a0d20 a2=50 a3=0 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff53a0c78 a2=28 a3=fffff53a0da8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff53a0ca8 a2=28 a3=fffff53a0dd8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff53a0b58 a2=28 a3=fffff53a0c88 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff53a0cc8 a2=28 a3=fffff53a0df8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff53a0ca8 a2=28 a3=fffff53a0dd8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff53a0c98 a2=28 a3=fffff53a0dc8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff53a0cc8 a2=28 a3=fffff53a0df8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff53a0ca8 a2=28 a3=fffff53a0dd8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff53a0cc8 a2=28 a3=fffff53a0df8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff53a0c98 a2=28 a3=fffff53a0dc8 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.989000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.989000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff53a0d18 a2=28 a3=fffff53a0e58 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff53a0a50 a2=50 a3=0 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit: BPF prog-id=157 op=LOAD May 15 10:19:36.990000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff53a0a58 a2=94 a3=5 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.990000 audit: BPF prog-id=157 op=UNLOAD May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff53a0b60 a2=50 a3=0 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff53a0ca8 a2=4 a3=3 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:36.990000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff53a0c88 a2=94 a3=6 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:36.990000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff53a0458 a2=94 a3=83 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:36.990000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff53a0458 a2=94 a3=83 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.990000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.990000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff53a1e98 a2=10 a3=fffff53a1f88 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.991000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.991000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff53a1d58 a2=10 a3=fffff53a1e48 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.991000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.991000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.991000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff53a1cc8 a2=10 a3=fffff53a1e48 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.991000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.991000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:36.991000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff53a1cc8 a2=10 a3=fffff53a1e48 items=0 ppid=3299 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:36.991000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:36.998000 audit: BPF prog-id=152 op=UNLOAD May 15 10:19:37.035000 audit[3469]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3469 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:37.035000 audit[3469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe684a0e0 a2=0 a3=ffff9e7effa8 items=0 ppid=3299 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.035000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:37.040000 audit[3470]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3470 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:37.040000 audit[3470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe1c736d0 a2=0 a3=ffffaec54fa8 items=0 ppid=3299 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.040000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:37.045000 audit[3473]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3473 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:37.045000 audit[3473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc13fdbb0 a2=0 a3=ffffb533afa8 items=0 ppid=3299 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.045000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:37.046000 audit[3468]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3468 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:37.046000 audit[3468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc2ad5f40 a2=0 a3=ffff93776fa8 items=0 ppid=3299 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.046000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:37.292961 kubelet[1959]: E0515 10:19:37.292917 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:38.770182 systemd-networkd[1047]: vxlan.calico: Gained IPv6LL May 15 10:19:40.208123 systemd[1]: Started sshd@8-10.0.0.84:22-10.0.0.1:50022.service. May 15 10:19:40.211990 kernel: kauditd_printk_skb: 559 callbacks suppressed May 15 10:19:40.212159 kernel: audit: type=1130 audit(1747304380.206:1117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.84:22-10.0.0.1:50022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:40.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.84:22-10.0.0.1:50022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:40.273000 audit[3508]: USER_ACCT pid=3508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.277059 sshd[3508]: Accepted publickey for core from 10.0.0.1 port 50022 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:40.285868 kernel: audit: type=1101 audit(1747304380.273:1118): pid=3508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.285939 kernel: audit: type=1103 audit(1747304380.276:1119): pid=3508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.285966 kernel: audit: type=1006 audit(1747304380.276:1120): pid=3508 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 15 10:19:40.286012 kernel: audit: type=1300 audit(1747304380.276:1120): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0dd0720 a2=3 a3=1 items=0 ppid=1 pid=3508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:40.286034 kernel: audit: type=1327 audit(1747304380.276:1120): proctitle=737368643A20636F7265205B707269765D May 15 10:19:40.276000 audit[3508]: CRED_ACQ pid=3508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.276000 audit[3508]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0dd0720 a2=3 a3=1 items=0 ppid=1 pid=3508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:40.276000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:19:40.279352 sshd[3508]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:40.296291 systemd[1]: Started session-9.scope. May 15 10:19:40.296601 systemd-logind[1207]: New session 9 of user core. May 15 10:19:40.306168 kernel: audit: type=1105 audit(1747304380.302:1121): pid=3508 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.302000 audit[3508]: USER_START pid=3508 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.305000 audit[3510]: CRED_ACQ pid=3510 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.309989 kernel: audit: type=1103 audit(1747304380.305:1122): pid=3510 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.456469 sshd[3508]: pam_unix(sshd:session): session closed for user core May 15 10:19:40.456000 audit[3508]: USER_END pid=3508 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.458685 systemd[1]: sshd@8-10.0.0.84:22-10.0.0.1:50022.service: Deactivated successfully. May 15 10:19:40.459452 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:19:40.456000 audit[3508]: CRED_DISP pid=3508 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.462033 systemd-logind[1207]: Session 9 logged out. Waiting for processes to exit. May 15 10:19:40.462332 kernel: audit: type=1106 audit(1747304380.456:1123): pid=3508 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.462373 kernel: audit: type=1104 audit(1747304380.456:1124): pid=3508 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:40.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.84:22-10.0.0.1:50022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:40.462893 systemd-logind[1207]: Removed session 9. May 15 10:19:42.192798 env[1221]: time="2025-05-15T10:19:42.192449653Z" level=info msg="StopPodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\"" May 15 10:19:42.261883 kubelet[1959]: I0515 10:19:42.261830 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5zvq5" podStartSLOduration=7.9499198920000005 podStartE2EDuration="22.261811411s" podCreationTimestamp="2025-05-15 10:19:20 +0000 UTC" firstStartedPulling="2025-05-15 10:19:20.578896494 +0000 UTC m=+13.518345567" lastFinishedPulling="2025-05-15 10:19:34.890788013 +0000 UTC m=+27.830237086" observedRunningTime="2025-05-15 10:19:35.312811646 +0000 UTC m=+28.252260719" watchObservedRunningTime="2025-05-15 10:19:42.261811411 +0000 UTC m=+35.201260484" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.262 [INFO][3545] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.263 [INFO][3545] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" iface="eth0" netns="/var/run/netns/cni-23549ff2-55fa-9116-9cea-44ffad366bca" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.265 [INFO][3545] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" iface="eth0" netns="/var/run/netns/cni-23549ff2-55fa-9116-9cea-44ffad366bca" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.266 [INFO][3545] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" iface="eth0" netns="/var/run/netns/cni-23549ff2-55fa-9116-9cea-44ffad366bca" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.266 [INFO][3545] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.266 [INFO][3545] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.392 [INFO][3554] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.392 [INFO][3554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.392 [INFO][3554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.402 [WARNING][3554] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.402 [INFO][3554] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.403 [INFO][3554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:42.409388 env[1221]: 2025-05-15 10:19:42.405 [INFO][3545] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:19:42.411612 env[1221]: time="2025-05-15T10:19:42.411569377Z" level=info msg="TearDown network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" successfully" May 15 10:19:42.411687 env[1221]: time="2025-05-15T10:19:42.411669025Z" level=info msg="StopPodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" returns successfully" May 15 10:19:42.413383 systemd[1]: run-netns-cni\x2d23549ff2\x2d55fa\x2d9116\x2d9cea\x2d44ffad366bca.mount: Deactivated successfully. May 15 10:19:42.414316 env[1221]: time="2025-05-15T10:19:42.414278996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d86bbcd9d-t2rkl,Uid:9b12bc62-9412-4685-b095-bcca74cee564,Namespace:calico-apiserver,Attempt:1,}" May 15 10:19:42.530183 systemd-networkd[1047]: cali1689dd60f19: Link UP May 15 10:19:42.532059 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:19:42.532146 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1689dd60f19: link becomes ready May 15 10:19:42.535115 systemd-networkd[1047]: cali1689dd60f19: Gained carrier May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.459 [INFO][3561] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0 calico-apiserver-7d86bbcd9d- calico-apiserver 9b12bc62-9412-4685-b095-bcca74cee564 884 0 2025-05-15 10:19:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7d86bbcd9d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7d86bbcd9d-t2rkl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1689dd60f19 [] []}} ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-t2rkl" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.460 [INFO][3561] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-t2rkl" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.488 [INFO][3577] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.500 [INFO][3577] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000307520), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7d86bbcd9d-t2rkl", "timestamp":"2025-05-15 10:19:42.488814331 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.502 [INFO][3577] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.502 [INFO][3577] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.502 [INFO][3577] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.504 [INFO][3577] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.509 [INFO][3577] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.512 [INFO][3577] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.514 [INFO][3577] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.516 [INFO][3577] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.516 [INFO][3577] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.517 [INFO][3577] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761 May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.521 [INFO][3577] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.525 [INFO][3577] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.525 [INFO][3577] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" host="localhost" May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.525 [INFO][3577] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:42.547495 env[1221]: 2025-05-15 10:19:42.525 [INFO][3577] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.548528 env[1221]: 2025-05-15 10:19:42.528 [INFO][3561] cni-plugin/k8s.go 386: Populated endpoint ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-t2rkl" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0", GenerateName:"calico-apiserver-7d86bbcd9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b12bc62-9412-4685-b095-bcca74cee564", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d86bbcd9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7d86bbcd9d-t2rkl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1689dd60f19", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:42.548528 env[1221]: 2025-05-15 10:19:42.528 [INFO][3561] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-t2rkl" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.548528 env[1221]: 2025-05-15 10:19:42.528 [INFO][3561] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1689dd60f19 ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-t2rkl" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.548528 env[1221]: 2025-05-15 10:19:42.532 [INFO][3561] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-t2rkl" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.548528 env[1221]: 2025-05-15 10:19:42.533 [INFO][3561] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-t2rkl" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0", GenerateName:"calico-apiserver-7d86bbcd9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b12bc62-9412-4685-b095-bcca74cee564", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d86bbcd9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761", Pod:"calico-apiserver-7d86bbcd9d-t2rkl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1689dd60f19", MAC:"12:a9:aa:e0:85:14", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:42.548528 env[1221]: 2025-05-15 10:19:42.545 [INFO][3561] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-t2rkl" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:19:42.555000 audit[3599]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:42.555000 audit[3599]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23492 a0=3 a1=fffff3e05fa0 a2=0 a3=ffffb9e28fa8 items=0 ppid=3299 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:42.555000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:42.566662 env[1221]: time="2025-05-15T10:19:42.566560406Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:42.566662 env[1221]: time="2025-05-15T10:19:42.566607650Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:42.566662 env[1221]: time="2025-05-15T10:19:42.566632011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:42.566856 env[1221]: time="2025-05-15T10:19:42.566794625Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761 pid=3608 runtime=io.containerd.runc.v2 May 15 10:19:42.584947 systemd[1]: Started cri-containerd-078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761.scope. May 15 10:19:42.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.603000 audit: BPF prog-id=158 op=LOAD May 15 10:19:42.604000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.604000 audit[3616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3608 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:42.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037386139336634616636323566323261323133356231353230383437 May 15 10:19:42.604000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.604000 audit[3616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3608 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:42.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037386139336634616636323566323261323133356231353230383437 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit: BPF prog-id=159 op=LOAD May 15 10:19:42.605000 audit[3616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3608 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:42.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037386139336634616636323566323261323133356231353230383437 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.605000 audit: BPF prog-id=160 op=LOAD May 15 10:19:42.605000 audit[3616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3608 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:42.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037386139336634616636323566323261323133356231353230383437 May 15 10:19:42.606000 audit: BPF prog-id=160 op=UNLOAD May 15 10:19:42.606000 audit: BPF prog-id=159 op=UNLOAD May 15 10:19:42.606000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:42.606000 audit: BPF prog-id=161 op=LOAD May 15 10:19:42.606000 audit[3616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3608 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:42.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037386139336634616636323566323261323133356231353230383437 May 15 10:19:42.608515 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:19:42.625826 env[1221]: time="2025-05-15T10:19:42.625776905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d86bbcd9d-t2rkl,Uid:9b12bc62-9412-4685-b095-bcca74cee564,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\"" May 15 10:19:42.627117 env[1221]: time="2025-05-15T10:19:42.627082970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:19:43.192536 env[1221]: time="2025-05-15T10:19:43.192490251Z" level=info msg="StopPodSandbox for \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\"" May 15 10:19:43.192846 env[1221]: time="2025-05-15T10:19:43.192490291Z" level=info msg="StopPodSandbox for \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\"" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.248 [INFO][3679] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.248 [INFO][3679] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" iface="eth0" netns="/var/run/netns/cni-a59c4d76-445a-69ce-253d-26ec25b63d5a" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.248 [INFO][3679] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" iface="eth0" netns="/var/run/netns/cni-a59c4d76-445a-69ce-253d-26ec25b63d5a" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.248 [INFO][3679] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" iface="eth0" netns="/var/run/netns/cni-a59c4d76-445a-69ce-253d-26ec25b63d5a" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.248 [INFO][3679] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.248 [INFO][3679] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.269 [INFO][3693] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.270 [INFO][3693] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.270 [INFO][3693] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.278 [WARNING][3693] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.278 [INFO][3693] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.280 [INFO][3693] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:43.287471 env[1221]: 2025-05-15 10:19:43.285 [INFO][3679] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:19:43.288845 env[1221]: time="2025-05-15T10:19:43.288241143Z" level=info msg="TearDown network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\" successfully" May 15 10:19:43.288845 env[1221]: time="2025-05-15T10:19:43.288293187Z" level=info msg="StopPodSandbox for \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\" returns successfully" May 15 10:19:43.289238 env[1221]: time="2025-05-15T10:19:43.289199298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d86bbcd9d-bbdtt,Uid:8b88ee4d-c3b4-4f30-b96e-f1e11842e59b,Namespace:calico-apiserver,Attempt:1,}" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.246 [INFO][3669] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.247 [INFO][3669] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" iface="eth0" netns="/var/run/netns/cni-4068fe1d-30db-4fd8-5df9-cecaf61a475f" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.248 [INFO][3669] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" iface="eth0" netns="/var/run/netns/cni-4068fe1d-30db-4fd8-5df9-cecaf61a475f" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.248 [INFO][3669] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" iface="eth0" netns="/var/run/netns/cni-4068fe1d-30db-4fd8-5df9-cecaf61a475f" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.248 [INFO][3669] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.248 [INFO][3669] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.270 [INFO][3691] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.270 [INFO][3691] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.280 [INFO][3691] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.289 [WARNING][3691] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.289 [INFO][3691] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.290 [INFO][3691] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:43.294950 env[1221]: 2025-05-15 10:19:43.292 [INFO][3669] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:19:43.295394 env[1221]: time="2025-05-15T10:19:43.295055996Z" level=info msg="TearDown network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\" successfully" May 15 10:19:43.295394 env[1221]: time="2025-05-15T10:19:43.295082838Z" level=info msg="StopPodSandbox for \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\" returns successfully" May 15 10:19:43.295725 env[1221]: time="2025-05-15T10:19:43.295674285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78d645f96f-nfvxb,Uid:ab7b7c44-1e90-4685-90d5-9a8c91357fbd,Namespace:calico-apiserver,Attempt:1,}" May 15 10:19:43.413219 systemd[1]: run-netns-cni\x2da59c4d76\x2d445a\x2d69ce\x2d253d\x2d26ec25b63d5a.mount: Deactivated successfully. May 15 10:19:43.413303 systemd[1]: run-netns-cni\x2d4068fe1d\x2d30db\x2d4fd8\x2d5df9\x2dcecaf61a475f.mount: Deactivated successfully. May 15 10:19:43.433235 systemd-networkd[1047]: califf79e32aec0: Link UP May 15 10:19:43.434065 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf79e32aec0: link becomes ready May 15 10:19:43.434478 systemd-networkd[1047]: califf79e32aec0: Gained carrier May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.335 [INFO][3706] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0 calico-apiserver-7d86bbcd9d- calico-apiserver 8b88ee4d-c3b4-4f30-b96e-f1e11842e59b 898 0 2025-05-15 10:19:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7d86bbcd9d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7d86bbcd9d-bbdtt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califf79e32aec0 [] []}} ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-bbdtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.335 [INFO][3706] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-bbdtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.367 [INFO][3735] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" HandleID="k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.379 [INFO][3735] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" HandleID="k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002dade0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7d86bbcd9d-bbdtt", "timestamp":"2025-05-15 10:19:43.367505865 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.379 [INFO][3735] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.379 [INFO][3735] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.379 [INFO][3735] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.381 [INFO][3735] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.385 [INFO][3735] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.389 [INFO][3735] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.391 [INFO][3735] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.397 [INFO][3735] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.397 [INFO][3735] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.398 [INFO][3735] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496 May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.423 [INFO][3735] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.429 [INFO][3735] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.429 [INFO][3735] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" host="localhost" May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.429 [INFO][3735] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:43.446405 env[1221]: 2025-05-15 10:19:43.429 [INFO][3735] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" HandleID="k8s-pod-network.60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.447009 env[1221]: 2025-05-15 10:19:43.431 [INFO][3706] cni-plugin/k8s.go 386: Populated endpoint ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-bbdtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0", GenerateName:"calico-apiserver-7d86bbcd9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"8b88ee4d-c3b4-4f30-b96e-f1e11842e59b", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d86bbcd9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7d86bbcd9d-bbdtt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf79e32aec0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:43.447009 env[1221]: 2025-05-15 10:19:43.431 [INFO][3706] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-bbdtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.447009 env[1221]: 2025-05-15 10:19:43.431 [INFO][3706] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califf79e32aec0 ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-bbdtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.447009 env[1221]: 2025-05-15 10:19:43.433 [INFO][3706] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-bbdtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.447009 env[1221]: 2025-05-15 10:19:43.434 [INFO][3706] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-bbdtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0", GenerateName:"calico-apiserver-7d86bbcd9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"8b88ee4d-c3b4-4f30-b96e-f1e11842e59b", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d86bbcd9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496", Pod:"calico-apiserver-7d86bbcd9d-bbdtt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf79e32aec0", MAC:"d2:a4:c8:df:21:30", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:43.447009 env[1221]: 2025-05-15 10:19:43.444 [INFO][3706] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496" Namespace="calico-apiserver" Pod="calico-apiserver-7d86bbcd9d-bbdtt" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:19:43.452000 audit[3768]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3768 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:43.452000 audit[3768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20328 a0=3 a1=ffffd20fcc60 a2=0 a3=ffff8c705fa8 items=0 ppid=3299 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.452000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:43.461319 env[1221]: time="2025-05-15T10:19:43.461247480Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:43.461481 env[1221]: time="2025-05-15T10:19:43.461445896Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:43.461560 env[1221]: time="2025-05-15T10:19:43.461531942Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:43.461791 env[1221]: time="2025-05-15T10:19:43.461757800Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496 pid=3775 runtime=io.containerd.runc.v2 May 15 10:19:43.476476 systemd[1]: Started cri-containerd-60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496.scope. May 15 10:19:43.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit: BPF prog-id=162 op=LOAD May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3775 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663462303832306263663034363935666261316165636563666361 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3775 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663462303832306263663034363935666261316165636563666361 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit: BPF prog-id=163 op=LOAD May 15 10:19:43.504000 audit[3786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3775 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663462303832306263663034363935666261316165636563666361 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit: BPF prog-id=164 op=LOAD May 15 10:19:43.504000 audit[3786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3775 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663462303832306263663034363935666261316165636563666361 May 15 10:19:43.504000 audit: BPF prog-id=164 op=UNLOAD May 15 10:19:43.504000 audit: BPF prog-id=163 op=UNLOAD May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.504000 audit: BPF prog-id=165 op=LOAD May 15 10:19:43.504000 audit[3786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3775 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663462303832306263663034363935666261316165636563666361 May 15 10:19:43.506457 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:19:43.516005 systemd-networkd[1047]: cali3af70340ddc: Link UP May 15 10:19:43.517003 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3af70340ddc: link becomes ready May 15 10:19:43.517014 systemd-networkd[1047]: cali3af70340ddc: Gained carrier May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.357 [INFO][3719] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0 calico-apiserver-78d645f96f- calico-apiserver ab7b7c44-1e90-4685-90d5-9a8c91357fbd 897 0 2025-05-15 10:19:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78d645f96f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-78d645f96f-nfvxb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3af70340ddc [] []}} ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-nfvxb" WorkloadEndpoint="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.357 [INFO][3719] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-nfvxb" WorkloadEndpoint="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.390 [INFO][3744] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" HandleID="k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.482 [INFO][3744] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" HandleID="k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000360ad0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-78d645f96f-nfvxb", "timestamp":"2025-05-15 10:19:43.390524146 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.482 [INFO][3744] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.482 [INFO][3744] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.482 [INFO][3744] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.485 [INFO][3744] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.489 [INFO][3744] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.492 [INFO][3744] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.494 [INFO][3744] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.496 [INFO][3744] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.496 [INFO][3744] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.498 [INFO][3744] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68 May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.502 [INFO][3744] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.507 [INFO][3744] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.507 [INFO][3744] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" host="localhost" May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.507 [INFO][3744] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:43.529685 env[1221]: 2025-05-15 10:19:43.507 [INFO][3744] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" HandleID="k8s-pod-network.ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.530371 env[1221]: 2025-05-15 10:19:43.514 [INFO][3719] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-nfvxb" WorkloadEndpoint="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0", GenerateName:"calico-apiserver-78d645f96f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab7b7c44-1e90-4685-90d5-9a8c91357fbd", ResourceVersion:"897", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78d645f96f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-78d645f96f-nfvxb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3af70340ddc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:43.530371 env[1221]: 2025-05-15 10:19:43.514 [INFO][3719] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-nfvxb" WorkloadEndpoint="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.530371 env[1221]: 2025-05-15 10:19:43.514 [INFO][3719] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3af70340ddc ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-nfvxb" WorkloadEndpoint="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.530371 env[1221]: 2025-05-15 10:19:43.517 [INFO][3719] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-nfvxb" WorkloadEndpoint="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.530371 env[1221]: 2025-05-15 10:19:43.517 [INFO][3719] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-nfvxb" WorkloadEndpoint="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0", GenerateName:"calico-apiserver-78d645f96f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab7b7c44-1e90-4685-90d5-9a8c91357fbd", ResourceVersion:"897", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78d645f96f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68", Pod:"calico-apiserver-78d645f96f-nfvxb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3af70340ddc", MAC:"6a:3d:45:49:99:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:43.530371 env[1221]: 2025-05-15 10:19:43.526 [INFO][3719] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-nfvxb" WorkloadEndpoint="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:19:43.534000 audit[3814]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:43.534000 audit[3814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21516 a0=3 a1=ffffd5cbe7d0 a2=0 a3=ffff99adffa8 items=0 ppid=3299 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.534000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:43.537624 env[1221]: time="2025-05-15T10:19:43.537582373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d86bbcd9d-bbdtt,Uid:8b88ee4d-c3b4-4f30-b96e-f1e11842e59b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496\"" May 15 10:19:43.546261 env[1221]: time="2025-05-15T10:19:43.546188126Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:43.546261 env[1221]: time="2025-05-15T10:19:43.546229250Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:43.546261 env[1221]: time="2025-05-15T10:19:43.546239810Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:43.546575 env[1221]: time="2025-05-15T10:19:43.546537634Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68 pid=3831 runtime=io.containerd.runc.v2 May 15 10:19:43.559625 systemd[1]: Started cri-containerd-ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68.scope. May 15 10:19:43.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit: BPF prog-id=166 op=LOAD May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3831 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363032653161303438366535353564633637376636613530316537 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3831 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363032653161303438366535353564633637376636613530316537 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit: BPF prog-id=167 op=LOAD May 15 10:19:43.577000 audit[3840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3831 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363032653161303438366535353564633637376636613530316537 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit: BPF prog-id=168 op=LOAD May 15 10:19:43.577000 audit[3840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3831 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363032653161303438366535353564633637376636613530316537 May 15 10:19:43.577000 audit: BPF prog-id=168 op=UNLOAD May 15 10:19:43.577000 audit: BPF prog-id=167 op=UNLOAD May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.577000 audit: BPF prog-id=169 op=LOAD May 15 10:19:43.577000 audit[3840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3831 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566363032653161303438366535353564633637376636613530316537 May 15 10:19:43.579641 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:19:43.595666 env[1221]: time="2025-05-15T10:19:43.595620114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78d645f96f-nfvxb,Uid:ab7b7c44-1e90-4685-90d5-9a8c91357fbd,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68\"" May 15 10:19:44.195999 env[1221]: time="2025-05-15T10:19:44.195938078Z" level=info msg="StopPodSandbox for \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\"" May 15 10:19:44.196425 env[1221]: time="2025-05-15T10:19:44.195968840Z" level=info msg="StopPodSandbox for \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\"" May 15 10:19:44.196578 env[1221]: time="2025-05-15T10:19:44.196540684Z" level=info msg="StopPodSandbox for \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\"" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.271 [INFO][3912] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.271 [INFO][3912] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" iface="eth0" netns="/var/run/netns/cni-be2d91c6-5669-fc2a-0c89-a7955db68953" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.272 [INFO][3912] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" iface="eth0" netns="/var/run/netns/cni-be2d91c6-5669-fc2a-0c89-a7955db68953" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.272 [INFO][3912] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" iface="eth0" netns="/var/run/netns/cni-be2d91c6-5669-fc2a-0c89-a7955db68953" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.272 [INFO][3912] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.272 [INFO][3912] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.314 [INFO][3940] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.314 [INFO][3940] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.314 [INFO][3940] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.327 [WARNING][3940] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.327 [INFO][3940] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.332 [INFO][3940] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:44.335634 env[1221]: 2025-05-15 10:19:44.334 [INFO][3912] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:19:44.336340 env[1221]: time="2025-05-15T10:19:44.336300497Z" level=info msg="TearDown network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\" successfully" May 15 10:19:44.336419 env[1221]: time="2025-05-15T10:19:44.336402945Z" level=info msg="StopPodSandbox for \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\" returns successfully" May 15 10:19:44.337226 env[1221]: time="2025-05-15T10:19:44.337190245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76scb,Uid:3c40d6c0-7b50-499e-8d90-66ba3800bea7,Namespace:calico-system,Attempt:1,}" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.288 [INFO][3928] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.288 [INFO][3928] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" iface="eth0" netns="/var/run/netns/cni-49c7dec1-1e2f-84a3-cb75-d0a4a977053f" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.288 [INFO][3928] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" iface="eth0" netns="/var/run/netns/cni-49c7dec1-1e2f-84a3-cb75-d0a4a977053f" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.290 [INFO][3928] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" iface="eth0" netns="/var/run/netns/cni-49c7dec1-1e2f-84a3-cb75-d0a4a977053f" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.290 [INFO][3928] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.290 [INFO][3928] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.339 [INFO][3950] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.339 [INFO][3950] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.339 [INFO][3950] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.348 [WARNING][3950] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.348 [INFO][3950] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.349 [INFO][3950] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:44.353063 env[1221]: 2025-05-15 10:19:44.351 [INFO][3928] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:19:44.354022 env[1221]: time="2025-05-15T10:19:44.353967959Z" level=info msg="TearDown network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\" successfully" May 15 10:19:44.354441 env[1221]: time="2025-05-15T10:19:44.354411193Z" level=info msg="StopPodSandbox for \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\" returns successfully" May 15 10:19:44.356691 env[1221]: time="2025-05-15T10:19:44.356653003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f98dd9fcb-7tgjn,Uid:66389d50-bf1d-4173-a03c-8eca0974a0aa,Namespace:calico-system,Attempt:1,}" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.277 [INFO][3905] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.277 [INFO][3905] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" iface="eth0" netns="/var/run/netns/cni-5c88c297-de2c-e347-2fbe-9d00520069f3" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.279 [INFO][3905] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" iface="eth0" netns="/var/run/netns/cni-5c88c297-de2c-e347-2fbe-9d00520069f3" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.279 [INFO][3905] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" iface="eth0" netns="/var/run/netns/cni-5c88c297-de2c-e347-2fbe-9d00520069f3" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.279 [INFO][3905] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.279 [INFO][3905] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.339 [INFO][3946] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.339 [INFO][3946] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.349 [INFO][3946] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.362 [WARNING][3946] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.362 [INFO][3946] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.363 [INFO][3946] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:44.371624 env[1221]: 2025-05-15 10:19:44.367 [INFO][3905] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:19:44.372709 env[1221]: time="2025-05-15T10:19:44.371722387Z" level=info msg="TearDown network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\" successfully" May 15 10:19:44.372709 env[1221]: time="2025-05-15T10:19:44.371750110Z" level=info msg="StopPodSandbox for \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\" returns successfully" May 15 10:19:44.372709 env[1221]: time="2025-05-15T10:19:44.372430041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gfgp6,Uid:f9568ad1-e01e-4fc3-9e6b-8060a82abcb8,Namespace:kube-system,Attempt:1,}" May 15 10:19:44.372898 kubelet[1959]: E0515 10:19:44.372065 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:44.402159 systemd-networkd[1047]: cali1689dd60f19: Gained IPv6LL May 15 10:19:44.414322 systemd[1]: run-netns-cni\x2dbe2d91c6\x2d5669\x2dfc2a\x2d0c89\x2da7955db68953.mount: Deactivated successfully. May 15 10:19:44.414407 systemd[1]: run-netns-cni\x2d49c7dec1\x2d1e2f\x2d84a3\x2dcb75\x2dd0a4a977053f.mount: Deactivated successfully. May 15 10:19:44.414455 systemd[1]: run-netns-cni\x2d5c88c297\x2dde2c\x2de347\x2d2fbe\x2d9d00520069f3.mount: Deactivated successfully. May 15 10:19:44.507508 systemd-networkd[1047]: cali8f143de75e2: Link UP May 15 10:19:44.509339 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:19:44.509392 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8f143de75e2: link becomes ready May 15 10:19:44.509490 systemd-networkd[1047]: cali8f143de75e2: Gained carrier May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.396 [INFO][3967] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--76scb-eth0 csi-node-driver- calico-system 3c40d6c0-7b50-499e-8d90-66ba3800bea7 918 0 2025-05-15 10:19:20 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-76scb eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali8f143de75e2 [] []}} ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Namespace="calico-system" Pod="csi-node-driver-76scb" WorkloadEndpoint="localhost-k8s-csi--node--driver--76scb-" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.396 [INFO][3967] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Namespace="calico-system" Pod="csi-node-driver-76scb" WorkloadEndpoint="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.443 [INFO][4014] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" HandleID="k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.466 [INFO][4014] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" HandleID="k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Workload="localhost-k8s-csi--node--driver--76scb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004327a0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-76scb", "timestamp":"2025-05-15 10:19:44.443946432 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.466 [INFO][4014] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.466 [INFO][4014] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.466 [INFO][4014] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.472 [INFO][4014] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.476 [INFO][4014] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.480 [INFO][4014] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.486 [INFO][4014] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.492 [INFO][4014] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.492 [INFO][4014] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.494 [INFO][4014] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316 May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.497 [INFO][4014] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.502 [INFO][4014] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.502 [INFO][4014] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" host="localhost" May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.502 [INFO][4014] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:44.525425 env[1221]: 2025-05-15 10:19:44.502 [INFO][4014] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" HandleID="k8s-pod-network.44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.526073 env[1221]: 2025-05-15 10:19:44.504 [INFO][3967] cni-plugin/k8s.go 386: Populated endpoint ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Namespace="calico-system" Pod="csi-node-driver-76scb" WorkloadEndpoint="localhost-k8s-csi--node--driver--76scb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--76scb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3c40d6c0-7b50-499e-8d90-66ba3800bea7", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-76scb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8f143de75e2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:44.526073 env[1221]: 2025-05-15 10:19:44.504 [INFO][3967] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Namespace="calico-system" Pod="csi-node-driver-76scb" WorkloadEndpoint="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.526073 env[1221]: 2025-05-15 10:19:44.504 [INFO][3967] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8f143de75e2 ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Namespace="calico-system" Pod="csi-node-driver-76scb" WorkloadEndpoint="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.526073 env[1221]: 2025-05-15 10:19:44.510 [INFO][3967] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Namespace="calico-system" Pod="csi-node-driver-76scb" WorkloadEndpoint="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.526073 env[1221]: 2025-05-15 10:19:44.512 [INFO][3967] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Namespace="calico-system" Pod="csi-node-driver-76scb" WorkloadEndpoint="localhost-k8s-csi--node--driver--76scb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--76scb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3c40d6c0-7b50-499e-8d90-66ba3800bea7", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316", Pod:"csi-node-driver-76scb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8f143de75e2", MAC:"b2:0e:90:03:95:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:44.526073 env[1221]: 2025-05-15 10:19:44.522 [INFO][3967] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316" Namespace="calico-system" Pod="csi-node-driver-76scb" WorkloadEndpoint="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:19:44.529000 audit[4044]: NETFILTER_CFG table=filter:104 family=2 entries=46 op=nft_register_chain pid=4044 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:44.529000 audit[4044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22712 a0=3 a1=ffffea882550 a2=0 a3=ffff86d97fa8 items=0 ppid=3299 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.529000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:44.562034 env[1221]: time="2025-05-15T10:19:44.561674533Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:44.562034 env[1221]: time="2025-05-15T10:19:44.561721376Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:44.562034 env[1221]: time="2025-05-15T10:19:44.561731657Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:44.568718 env[1221]: time="2025-05-15T10:19:44.564651479Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316 pid=4065 runtime=io.containerd.runc.v2 May 15 10:19:44.603463 systemd[1]: Started cri-containerd-44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316.scope. May 15 10:19:44.633833 systemd-networkd[1047]: calia68d11a7a35: Link UP May 15 10:19:44.635800 systemd-networkd[1047]: calia68d11a7a35: Gained carrier May 15 10:19:44.635998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia68d11a7a35: link becomes ready May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.406 [INFO][3983] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0 calico-kube-controllers-7f98dd9fcb- calico-system 66389d50-bf1d-4173-a03c-8eca0974a0aa 920 0 2025-05-15 10:19:20 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7f98dd9fcb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7f98dd9fcb-7tgjn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia68d11a7a35 [] []}} ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Namespace="calico-system" Pod="calico-kube-controllers-7f98dd9fcb-7tgjn" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.406 [INFO][3983] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Namespace="calico-system" Pod="calico-kube-controllers-7f98dd9fcb-7tgjn" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.452 [INFO][4022] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" HandleID="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.473 [INFO][4022] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" HandleID="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f30d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7f98dd9fcb-7tgjn", "timestamp":"2025-05-15 10:19:44.452247863 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.473 [INFO][4022] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.503 [INFO][4022] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.503 [INFO][4022] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.572 [INFO][4022] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.582 [INFO][4022] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.595 [INFO][4022] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.603 [INFO][4022] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.610 [INFO][4022] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.610 [INFO][4022] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.611 [INFO][4022] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051 May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.615 [INFO][4022] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.623 [INFO][4022] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.623 [INFO][4022] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" host="localhost" May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.623 [INFO][4022] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:44.649265 env[1221]: 2025-05-15 10:19:44.623 [INFO][4022] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" HandleID="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.650036 env[1221]: 2025-05-15 10:19:44.632 [INFO][3983] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Namespace="calico-system" Pod="calico-kube-controllers-7f98dd9fcb-7tgjn" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0", GenerateName:"calico-kube-controllers-7f98dd9fcb-", Namespace:"calico-system", SelfLink:"", UID:"66389d50-bf1d-4173-a03c-8eca0974a0aa", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f98dd9fcb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7f98dd9fcb-7tgjn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia68d11a7a35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:44.650036 env[1221]: 2025-05-15 10:19:44.632 [INFO][3983] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Namespace="calico-system" Pod="calico-kube-controllers-7f98dd9fcb-7tgjn" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.650036 env[1221]: 2025-05-15 10:19:44.632 [INFO][3983] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia68d11a7a35 ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Namespace="calico-system" Pod="calico-kube-controllers-7f98dd9fcb-7tgjn" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.650036 env[1221]: 2025-05-15 10:19:44.634 [INFO][3983] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Namespace="calico-system" Pod="calico-kube-controllers-7f98dd9fcb-7tgjn" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.650036 env[1221]: 2025-05-15 10:19:44.636 [INFO][3983] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Namespace="calico-system" Pod="calico-kube-controllers-7f98dd9fcb-7tgjn" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0", GenerateName:"calico-kube-controllers-7f98dd9fcb-", Namespace:"calico-system", SelfLink:"", UID:"66389d50-bf1d-4173-a03c-8eca0974a0aa", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f98dd9fcb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051", Pod:"calico-kube-controllers-7f98dd9fcb-7tgjn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia68d11a7a35", MAC:"9e:64:3e:ae:8f:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:44.650036 env[1221]: 2025-05-15 10:19:44.647 [INFO][3983] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Namespace="calico-system" Pod="calico-kube-controllers-7f98dd9fcb-7tgjn" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:19:44.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.659000 audit: BPF prog-id=170 op=LOAD May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4065 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393132663362663261303938383138366238306363343165316161 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4065 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393132663362663261303938383138366238306363343165316161 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit: BPF prog-id=171 op=LOAD May 15 10:19:44.661000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4065 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393132663362663261303938383138366238306363343165316161 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit: BPF prog-id=172 op=LOAD May 15 10:19:44.661000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4065 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393132663362663261303938383138366238306363343165316161 May 15 10:19:44.661000 audit: BPF prog-id=172 op=UNLOAD May 15 10:19:44.661000 audit: BPF prog-id=171 op=UNLOAD May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.661000 audit: BPF prog-id=173 op=LOAD May 15 10:19:44.661000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4065 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393132663362663261303938383138366238306363343165316161 May 15 10:19:44.665541 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:19:44.672000 audit[4103]: NETFILTER_CFG table=filter:105 family=2 entries=46 op=nft_register_chain pid=4103 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:44.672000 audit[4103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22204 a0=3 a1=ffffded2f3c0 a2=0 a3=ffffa307afa8 items=0 ppid=3299 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.672000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:44.677872 env[1221]: time="2025-05-15T10:19:44.677348437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-76scb,Uid:3c40d6c0-7b50-499e-8d90-66ba3800bea7,Namespace:calico-system,Attempt:1,} returns sandbox id \"44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316\"" May 15 10:19:44.684127 env[1221]: time="2025-05-15T10:19:44.684048106Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:44.684127 env[1221]: time="2025-05-15T10:19:44.684108431Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:44.684127 env[1221]: time="2025-05-15T10:19:44.684119272Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:44.684456 env[1221]: time="2025-05-15T10:19:44.684400653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051 pid=4119 runtime=io.containerd.runc.v2 May 15 10:19:44.712727 systemd[1]: Started cri-containerd-6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051.scope. May 15 10:19:44.721132 systemd-networkd[1047]: cali3671b14ea21: Link UP May 15 10:19:44.722124 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3671b14ea21: link becomes ready May 15 10:19:44.721960 systemd-networkd[1047]: cali3671b14ea21: Gained carrier May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.433 [INFO][3999] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0 coredns-668d6bf9bc- kube-system f9568ad1-e01e-4fc3-9e6b-8060a82abcb8 919 0 2025-05-15 10:19:13 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-gfgp6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3671b14ea21 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Namespace="kube-system" Pod="coredns-668d6bf9bc-gfgp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--gfgp6-" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.433 [INFO][3999] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Namespace="kube-system" Pod="coredns-668d6bf9bc-gfgp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.480 [INFO][4031] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" HandleID="k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.496 [INFO][4031] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" HandleID="k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000418080), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-gfgp6", "timestamp":"2025-05-15 10:19:44.480246949 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.496 [INFO][4031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.623 [INFO][4031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.623 [INFO][4031] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.673 [INFO][4031] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.678 [INFO][4031] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.693 [INFO][4031] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.696 [INFO][4031] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.699 [INFO][4031] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.699 [INFO][4031] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.700 [INFO][4031] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.705 [INFO][4031] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.711 [INFO][4031] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.711 [INFO][4031] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" host="localhost" May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.711 [INFO][4031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:44.740094 env[1221]: 2025-05-15 10:19:44.711 [INFO][4031] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" HandleID="k8s-pod-network.d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.740743 env[1221]: 2025-05-15 10:19:44.716 [INFO][3999] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Namespace="kube-system" Pod="coredns-668d6bf9bc-gfgp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"f9568ad1-e01e-4fc3-9e6b-8060a82abcb8", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-gfgp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3671b14ea21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:44.740743 env[1221]: 2025-05-15 10:19:44.717 [INFO][3999] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Namespace="kube-system" Pod="coredns-668d6bf9bc-gfgp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.740743 env[1221]: 2025-05-15 10:19:44.717 [INFO][3999] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3671b14ea21 ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Namespace="kube-system" Pod="coredns-668d6bf9bc-gfgp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.740743 env[1221]: 2025-05-15 10:19:44.722 [INFO][3999] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Namespace="kube-system" Pod="coredns-668d6bf9bc-gfgp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.740743 env[1221]: 2025-05-15 10:19:44.724 [INFO][3999] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Namespace="kube-system" Pod="coredns-668d6bf9bc-gfgp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"f9568ad1-e01e-4fc3-9e6b-8060a82abcb8", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b", Pod:"coredns-668d6bf9bc-gfgp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3671b14ea21", MAC:"72:9c:d8:8d:fc:a8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:44.740743 env[1221]: 2025-05-15 10:19:44.736 [INFO][3999] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b" Namespace="kube-system" Pod="coredns-668d6bf9bc-gfgp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:19:44.747000 audit[4157]: NETFILTER_CFG table=filter:106 family=2 entries=60 op=nft_register_chain pid=4157 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:44.747000 audit[4157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27940 a0=3 a1=ffffea5c6790 a2=0 a3=ffffbdafffa8 items=0 ppid=3299 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.747000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit: BPF prog-id=174 op=LOAD May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4119 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343161373039623936383930393634623930343239303735383263 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4119 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343161373039623936383930393634623930343239303735383263 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit: BPF prog-id=175 op=LOAD May 15 10:19:44.748000 audit[4129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4119 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343161373039623936383930393634623930343239303735383263 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.748000 audit: BPF prog-id=176 op=LOAD May 15 10:19:44.748000 audit[4129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4119 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343161373039623936383930393634623930343239303735383263 May 15 10:19:44.748000 audit: BPF prog-id=176 op=UNLOAD May 15 10:19:44.749000 audit: BPF prog-id=175 op=UNLOAD May 15 10:19:44.749000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { perfmon } for pid=4129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit[4129]: AVC avc: denied { bpf } for pid=4129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.749000 audit: BPF prog-id=177 op=LOAD May 15 10:19:44.749000 audit[4129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4119 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662343161373039623936383930393634623930343239303735383263 May 15 10:19:44.751272 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:19:44.765143 env[1221]: time="2025-05-15T10:19:44.761474466Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:44.765143 env[1221]: time="2025-05-15T10:19:44.761517469Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:44.765143 env[1221]: time="2025-05-15T10:19:44.761527870Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:44.765535 env[1221]: time="2025-05-15T10:19:44.765479810Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b pid=4169 runtime=io.containerd.runc.v2 May 15 10:19:44.770551 env[1221]: time="2025-05-15T10:19:44.770510432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f98dd9fcb-7tgjn,Uid:66389d50-bf1d-4173-a03c-8eca0974a0aa,Namespace:calico-system,Attempt:1,} returns sandbox id \"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051\"" May 15 10:19:44.784535 systemd[1]: Started cri-containerd-d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b.scope. May 15 10:19:44.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit: BPF prog-id=178 op=LOAD May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4169 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666238666331636462633539393262353236313739613332313032 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4169 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666238666331636462633539393262353236313739613332313032 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit: BPF prog-id=179 op=LOAD May 15 10:19:44.809000 audit[4187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4169 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666238666331636462633539393262353236313739613332313032 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit: BPF prog-id=180 op=LOAD May 15 10:19:44.809000 audit[4187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4169 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666238666331636462633539393262353236313739613332313032 May 15 10:19:44.809000 audit: BPF prog-id=180 op=UNLOAD May 15 10:19:44.809000 audit: BPF prog-id=179 op=UNLOAD May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { perfmon } for pid=4187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit[4187]: AVC avc: denied { bpf } for pid=4187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.809000 audit: BPF prog-id=181 op=LOAD May 15 10:19:44.809000 audit[4187]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4169 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666238666331636462633539393262353236313739613332313032 May 15 10:19:44.812195 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:19:44.836533 env[1221]: time="2025-05-15T10:19:44.836473922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gfgp6,Uid:f9568ad1-e01e-4fc3-9e6b-8060a82abcb8,Namespace:kube-system,Attempt:1,} returns sandbox id \"d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b\"" May 15 10:19:44.839960 kubelet[1959]: E0515 10:19:44.839935 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:44.841515 env[1221]: time="2025-05-15T10:19:44.841478662Z" level=info msg="CreateContainer within sandbox \"d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:19:44.857446 env[1221]: time="2025-05-15T10:19:44.857401671Z" level=info msg="CreateContainer within sandbox \"d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ba790139a89f27645bdaf8857433ffa9a9024b1aa38d90725480176888d8dea6\"" May 15 10:19:44.858248 env[1221]: time="2025-05-15T10:19:44.858220533Z" level=info msg="StartContainer for \"ba790139a89f27645bdaf8857433ffa9a9024b1aa38d90725480176888d8dea6\"" May 15 10:19:44.873149 systemd[1]: Started cri-containerd-ba790139a89f27645bdaf8857433ffa9a9024b1aa38d90725480176888d8dea6.scope. May 15 10:19:44.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.907000 audit: BPF prog-id=182 op=LOAD May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4169 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373930313339613839663237363435626461663838353734333366 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4169 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373930313339613839663237363435626461663838353734333366 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit: BPF prog-id=183 op=LOAD May 15 10:19:44.908000 audit[4216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4169 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373930313339613839663237363435626461663838353734333366 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit: BPF prog-id=184 op=LOAD May 15 10:19:44.908000 audit[4216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4169 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373930313339613839663237363435626461663838353734333366 May 15 10:19:44.908000 audit: BPF prog-id=184 op=UNLOAD May 15 10:19:44.908000 audit: BPF prog-id=183 op=UNLOAD May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:44.908000 audit: BPF prog-id=185 op=LOAD May 15 10:19:44.908000 audit[4216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4169 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:44.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373930313339613839663237363435626461663838353734333366 May 15 10:19:44.934485 env[1221]: time="2025-05-15T10:19:44.934438761Z" level=info msg="StartContainer for \"ba790139a89f27645bdaf8857433ffa9a9024b1aa38d90725480176888d8dea6\" returns successfully" May 15 10:19:44.978131 systemd-networkd[1047]: cali3af70340ddc: Gained IPv6LL May 15 10:19:44.999000 audit[4227]: AVC avc: denied { getattr } for pid=4227 comm="coredns" path="cgroup:[4026532219]" dev="nsfs" ino=4026532219 scontext=system_u:system_r:svirt_lxc_net_t:s0:c312,c797 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 15 10:19:44.999000 audit[4227]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000154ac8 a2=4000156578 a3=0 items=0 ppid=4169 pid=4227 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c312,c797 key=(null) May 15 10:19:44.999000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 15 10:19:45.184161 env[1221]: time="2025-05-15T10:19:45.184039441Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.186111 env[1221]: time="2025-05-15T10:19:45.185880737Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.189353 env[1221]: time="2025-05-15T10:19:45.189312430Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.190868 env[1221]: time="2025-05-15T10:19:45.190829862Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.191432 env[1221]: time="2025-05-15T10:19:45.191403504Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 15 10:19:45.194023 env[1221]: time="2025-05-15T10:19:45.193889128Z" level=info msg="StopPodSandbox for \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\"" May 15 10:19:45.195349 env[1221]: time="2025-05-15T10:19:45.195276750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:19:45.195599 env[1221]: time="2025-05-15T10:19:45.195452523Z" level=info msg="CreateContainer within sandbox \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:19:45.209346 env[1221]: time="2025-05-15T10:19:45.209295544Z" level=info msg="CreateContainer within sandbox \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\"" May 15 10:19:45.210050 env[1221]: time="2025-05-15T10:19:45.210014077Z" level=info msg="StartContainer for \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\"" May 15 10:19:45.224640 systemd[1]: Started cri-containerd-4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0.scope. May 15 10:19:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258938 kernel: kauditd_printk_skb: 421 callbacks suppressed May 15 10:19:45.259027 kernel: audit: type=1400 audit(1747304385.255:1259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259054 kernel: audit: type=1400 audit(1747304385.255:1260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.262815 kernel: audit: type=1400 audit(1747304385.255:1261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.263000 kernel: audit: type=1400 audit(1747304385.255:1262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.267184 kernel: audit: type=1400 audit(1747304385.255:1263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.269590 kernel: audit: type=1400 audit(1747304385.255:1264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.274004 kernel: audit: type=1400 audit(1747304385.255:1265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.274079 kernel: audit: type=1400 audit(1747304385.255:1266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.278757 kernel: audit: type=1400 audit(1747304385.255:1267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.283678 kernel: audit: type=1400 audit(1747304385.255:1268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit: BPF prog-id=186 op=LOAD May 15 10:19:45.255000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3608 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363865333034306238396165656262383563393634633435316430 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3608 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363865333034306238396165656262383563393634633435316430 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.255000 audit: BPF prog-id=187 op=LOAD May 15 10:19:45.255000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3608 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363865333034306238396165656262383563393634633435316430 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.258000 audit: BPF prog-id=188 op=LOAD May 15 10:19:45.258000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3608 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363865333034306238396165656262383563393634633435316430 May 15 10:19:45.259000 audit: BPF prog-id=188 op=UNLOAD May 15 10:19:45.259000 audit: BPF prog-id=187 op=UNLOAD May 15 10:19:45.259000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.259000 audit: BPF prog-id=189 op=LOAD May 15 10:19:45.259000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3608 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363865333034306238396165656262383563393634633435316430 May 15 10:19:45.302825 env[1221]: time="2025-05-15T10:19:45.300943666Z" level=info msg="StartContainer for \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\" returns successfully" May 15 10:19:45.330350 kubelet[1959]: E0515 10:19:45.330068 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:45.365299 kubelet[1959]: I0515 10:19:45.364853 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-gfgp6" podStartSLOduration=32.36483786 podStartE2EDuration="32.36483786s" podCreationTimestamp="2025-05-15 10:19:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:19:45.364239976 +0000 UTC m=+38.303689049" watchObservedRunningTime="2025-05-15 10:19:45.36483786 +0000 UTC m=+38.304286933" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.281 [INFO][4277] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.281 [INFO][4277] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" iface="eth0" netns="/var/run/netns/cni-b9d883ac-5b6a-4ddc-b66b-eb64a0b1fa83" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.281 [INFO][4277] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" iface="eth0" netns="/var/run/netns/cni-b9d883ac-5b6a-4ddc-b66b-eb64a0b1fa83" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.283 [INFO][4277] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" iface="eth0" netns="/var/run/netns/cni-b9d883ac-5b6a-4ddc-b66b-eb64a0b1fa83" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.283 [INFO][4277] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.283 [INFO][4277] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.318 [INFO][4297] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.318 [INFO][4297] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.318 [INFO][4297] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.348 [WARNING][4297] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.348 [INFO][4297] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.356 [INFO][4297] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:45.369844 env[1221]: 2025-05-15 10:19:45.364 [INFO][4277] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:19:45.370340 env[1221]: time="2025-05-15T10:19:45.370077887Z" level=info msg="TearDown network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\" successfully" May 15 10:19:45.370340 env[1221]: time="2025-05-15T10:19:45.370121730Z" level=info msg="StopPodSandbox for \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\" returns successfully" May 15 10:19:45.371093 kubelet[1959]: E0515 10:19:45.370600 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:45.371455 env[1221]: time="2025-05-15T10:19:45.371421786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-tkzfl,Uid:30eb1573-ab57-40ef-b9fa-ed1521a014a6,Namespace:kube-system,Attempt:1,}" May 15 10:19:45.385000 kubelet[1959]: I0515 10:19:45.384934 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-t2rkl" podStartSLOduration=23.817456493999998 podStartE2EDuration="26.384918782s" podCreationTimestamp="2025-05-15 10:19:19 +0000 UTC" firstStartedPulling="2025-05-15 10:19:42.626849951 +0000 UTC m=+35.566299024" lastFinishedPulling="2025-05-15 10:19:45.194312239 +0000 UTC m=+38.133761312" observedRunningTime="2025-05-15 10:19:45.384205089 +0000 UTC m=+38.323654162" watchObservedRunningTime="2025-05-15 10:19:45.384918782 +0000 UTC m=+38.324367855" May 15 10:19:45.417759 systemd[1]: run-containerd-runc-k8s.io-6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051-runc.auuJBx.mount: Deactivated successfully. May 15 10:19:45.417856 systemd[1]: run-netns-cni\x2db9d883ac\x2d5b6a\x2d4ddc\x2db66b\x2deb64a0b1fa83.mount: Deactivated successfully. May 15 10:19:45.426123 systemd-networkd[1047]: califf79e32aec0: Gained IPv6LL May 15 10:19:45.436000 audit[4330]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.436000 audit[4330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffdfea20b0 a2=0 a3=1 items=0 ppid=2108 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.443382 env[1221]: time="2025-05-15T10:19:45.443336092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.443000 audit[4330]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.443000 audit[4330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffdfea20b0 a2=0 a3=1 items=0 ppid=2108 pid=4330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.446738 env[1221]: time="2025-05-15T10:19:45.446698420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.449356 env[1221]: time="2025-05-15T10:19:45.449323934Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.452038 env[1221]: time="2025-05-15T10:19:45.451995371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.452439 env[1221]: time="2025-05-15T10:19:45.452401321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 15 10:19:45.457657 env[1221]: time="2025-05-15T10:19:45.457618626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:19:45.459674 env[1221]: time="2025-05-15T10:19:45.459635575Z" level=info msg="CreateContainer within sandbox \"60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:19:45.465299 systemd[1]: Started sshd@9-10.0.0.84:22-10.0.0.1:48038.service. May 15 10:19:45.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.84:22-10.0.0.1:48038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:45.472000 audit[4336]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.472000 audit[4336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffeeb887d0 a2=0 a3=1 items=0 ppid=2108 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.485247 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2189080432.mount: Deactivated successfully. May 15 10:19:45.481000 audit[4336]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.481000 audit[4336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffeeb887d0 a2=0 a3=1 items=0 ppid=2108 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.502100 env[1221]: time="2025-05-15T10:19:45.502040984Z" level=info msg="CreateContainer within sandbox \"60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fe62191931faf09077b84fd2f4ac52480cbe4e4ba8e34efb287f274dbba7166a\"" May 15 10:19:45.504916 env[1221]: time="2025-05-15T10:19:45.504876673Z" level=info msg="StartContainer for \"fe62191931faf09077b84fd2f4ac52480cbe4e4ba8e34efb287f274dbba7166a\"" May 15 10:19:45.528000 audit[4335]: USER_ACCT pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.530217 sshd[4335]: Accepted publickey for core from 10.0.0.1 port 48038 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:45.530234 systemd[1]: Started cri-containerd-fe62191931faf09077b84fd2f4ac52480cbe4e4ba8e34efb287f274dbba7166a.scope. May 15 10:19:45.529000 audit[4335]: CRED_ACQ pid=4335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.530000 audit[4335]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd38a4440 a2=3 a3=1 items=0 ppid=1 pid=4335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.530000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:19:45.532670 sshd[4335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:45.539137 systemd[1]: Started session-10.scope. May 15 10:19:45.539713 systemd-logind[1207]: New session 10 of user core. May 15 10:19:45.545000 audit[4335]: USER_START pid=4335 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.546000 audit[4366]: CRED_ACQ pid=4366 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.590000 audit: BPF prog-id=190 op=LOAD May 15 10:19:45.591000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3775 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363231393139333166616630393037376238346664326634616335 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3775 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363231393139333166616630393037376238346664326634616335 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.591000 audit: BPF prog-id=191 op=LOAD May 15 10:19:45.591000 audit[4353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3775 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363231393139333166616630393037376238346664326634616335 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit: BPF prog-id=192 op=LOAD May 15 10:19:45.592000 audit[4353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3775 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363231393139333166616630393037376238346664326634616335 May 15 10:19:45.592000 audit: BPF prog-id=192 op=UNLOAD May 15 10:19:45.592000 audit: BPF prog-id=191 op=UNLOAD May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.592000 audit: BPF prog-id=193 op=LOAD May 15 10:19:45.592000 audit[4353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3775 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363231393139333166616630393037376238346664326634616335 May 15 10:19:45.610189 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:19:45.610294 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali44a0348ad89: link becomes ready May 15 10:19:45.610408 systemd-networkd[1047]: cali44a0348ad89: Link UP May 15 10:19:45.610542 systemd-networkd[1047]: cali44a0348ad89: Gained carrier May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.461 [INFO][4316] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0 coredns-668d6bf9bc- kube-system 30eb1573-ab57-40ef-b9fa-ed1521a014a6 948 0 2025-05-15 10:19:13 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-tkzfl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali44a0348ad89 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Namespace="kube-system" Pod="coredns-668d6bf9bc-tkzfl" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tkzfl-" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.461 [INFO][4316] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Namespace="kube-system" Pod="coredns-668d6bf9bc-tkzfl" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.523 [INFO][4338] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" HandleID="k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.548 [INFO][4338] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" HandleID="k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000444690), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-tkzfl", "timestamp":"2025-05-15 10:19:45.52354221 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.548 [INFO][4338] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.548 [INFO][4338] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.548 [INFO][4338] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.558 [INFO][4338] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.573 [INFO][4338] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.578 [INFO][4338] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.579 [INFO][4338] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.582 [INFO][4338] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.582 [INFO][4338] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.583 [INFO][4338] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.589 [INFO][4338] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.600 [INFO][4338] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.601 [INFO][4338] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" host="localhost" May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.601 [INFO][4338] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:45.629154 env[1221]: 2025-05-15 10:19:45.601 [INFO][4338] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" HandleID="k8s-pod-network.121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.630089 env[1221]: 2025-05-15 10:19:45.605 [INFO][4316] cni-plugin/k8s.go 386: Populated endpoint ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Namespace="kube-system" Pod="coredns-668d6bf9bc-tkzfl" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"30eb1573-ab57-40ef-b9fa-ed1521a014a6", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-tkzfl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali44a0348ad89", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:45.630089 env[1221]: 2025-05-15 10:19:45.605 [INFO][4316] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.135/32] ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Namespace="kube-system" Pod="coredns-668d6bf9bc-tkzfl" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.630089 env[1221]: 2025-05-15 10:19:45.605 [INFO][4316] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali44a0348ad89 ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Namespace="kube-system" Pod="coredns-668d6bf9bc-tkzfl" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.630089 env[1221]: 2025-05-15 10:19:45.610 [INFO][4316] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Namespace="kube-system" Pod="coredns-668d6bf9bc-tkzfl" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.630089 env[1221]: 2025-05-15 10:19:45.611 [INFO][4316] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Namespace="kube-system" Pod="coredns-668d6bf9bc-tkzfl" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"30eb1573-ab57-40ef-b9fa-ed1521a014a6", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e", Pod:"coredns-668d6bf9bc-tkzfl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali44a0348ad89", MAC:"be:32:c3:a5:fc:71", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:19:45.630089 env[1221]: 2025-05-15 10:19:45.622 [INFO][4316] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e" Namespace="kube-system" Pod="coredns-668d6bf9bc-tkzfl" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:19:45.638532 env[1221]: time="2025-05-15T10:19:45.638481130Z" level=info msg="StartContainer for \"fe62191931faf09077b84fd2f4ac52480cbe4e4ba8e34efb287f274dbba7166a\" returns successfully" May 15 10:19:45.648367 env[1221]: time="2025-05-15T10:19:45.648298175Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:45.648367 env[1221]: time="2025-05-15T10:19:45.648339218Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:45.648539 env[1221]: time="2025-05-15T10:19:45.648354539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:45.648666 env[1221]: time="2025-05-15T10:19:45.648632839Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e pid=4414 runtime=io.containerd.runc.v2 May 15 10:19:45.644000 audit[4405]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:45.644000 audit[4405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21768 a0=3 a1=ffffe89c7e90 a2=0 a3=ffff9a5fffa8 items=0 ppid=3299 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.644000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:45.670010 systemd[1]: Started cri-containerd-121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e.scope. May 15 10:19:45.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.693000 audit: BPF prog-id=194 op=LOAD May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4414 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316434383239343065323935303866316131623362656363623639 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4414 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316434383239343065323935303866316131623362656363623639 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit: BPF prog-id=195 op=LOAD May 15 10:19:45.695000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4414 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316434383239343065323935303866316131623362656363623639 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit: BPF prog-id=196 op=LOAD May 15 10:19:45.695000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4414 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316434383239343065323935303866316131623362656363623639 May 15 10:19:45.695000 audit: BPF prog-id=196 op=UNLOAD May 15 10:19:45.695000 audit: BPF prog-id=195 op=UNLOAD May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { perfmon } for pid=4423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit[4423]: AVC avc: denied { bpf } for pid=4423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.695000 audit: BPF prog-id=197 op=LOAD May 15 10:19:45.695000 audit[4423]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4414 pid=4423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132316434383239343065323935303866316131623362656363623639 May 15 10:19:45.698260 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:19:45.715527 env[1221]: time="2025-05-15T10:19:45.715465490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.719843 env[1221]: time="2025-05-15T10:19:45.719808131Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.723893 env[1221]: time="2025-05-15T10:19:45.723801625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.725453 env[1221]: time="2025-05-15T10:19:45.725418865Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 15 10:19:45.725653 env[1221]: time="2025-05-15T10:19:45.724848343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:45.729252 env[1221]: time="2025-05-15T10:19:45.728525414Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:19:45.731192 env[1221]: time="2025-05-15T10:19:45.731159448Z" level=info msg="CreateContainer within sandbox \"ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:19:45.745567 env[1221]: time="2025-05-15T10:19:45.745529828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-tkzfl,Uid:30eb1573-ab57-40ef-b9fa-ed1521a014a6,Namespace:kube-system,Attempt:1,} returns sandbox id \"121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e\"" May 15 10:19:45.748567 kubelet[1959]: E0515 10:19:45.746562 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:45.757394 env[1221]: time="2025-05-15T10:19:45.756745456Z" level=info msg="CreateContainer within sandbox \"ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"46c1c0e3b38d676e3d1f323972f75b04abbdca0f174e5ce3106bf3a5327f0149\"" May 15 10:19:45.758046 env[1221]: time="2025-05-15T10:19:45.757925663Z" level=info msg="StartContainer for \"46c1c0e3b38d676e3d1f323972f75b04abbdca0f174e5ce3106bf3a5327f0149\"" May 15 10:19:45.758209 env[1221]: time="2025-05-15T10:19:45.758179602Z" level=info msg="CreateContainer within sandbox \"121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:19:45.776816 env[1221]: time="2025-05-15T10:19:45.774129299Z" level=info msg="CreateContainer within sandbox \"121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2249b46d9c03fcf59a68137ff054eec782e568619b0bb59aeb28aa8250181aba\"" May 15 10:19:45.777483 env[1221]: time="2025-05-15T10:19:45.777413741Z" level=info msg="StartContainer for \"2249b46d9c03fcf59a68137ff054eec782e568619b0bb59aeb28aa8250181aba\"" May 15 10:19:45.791530 systemd[1]: Started cri-containerd-46c1c0e3b38d676e3d1f323972f75b04abbdca0f174e5ce3106bf3a5327f0149.scope. May 15 10:19:45.809906 sshd[4335]: pam_unix(sshd:session): session closed for user core May 15 10:19:45.810566 systemd-networkd[1047]: cali8f143de75e2: Gained IPv6LL May 15 10:19:45.810000 audit[4335]: USER_END pid=4335 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.810000 audit[4335]: CRED_DISP pid=4335 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.814878 systemd[1]: sshd@9-10.0.0.84:22-10.0.0.1:48038.service: Deactivated successfully. May 15 10:19:45.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.84:22-10.0.0.1:48038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:45.815528 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:19:45.817054 systemd-logind[1207]: Session 10 logged out. Waiting for processes to exit. May 15 10:19:45.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.84:22-10.0.0.1:48042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:45.817328 systemd[1]: Started sshd@10-10.0.0.84:22-10.0.0.1:48042.service. May 15 10:19:45.822253 systemd-logind[1207]: Removed session 10. May 15 10:19:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.825000 audit: BPF prog-id=198 op=LOAD May 15 10:19:45.827000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.827000 audit[4461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3831 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633163306533623338643637366533643166333233393732663735 May 15 10:19:45.827000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.827000 audit[4461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3831 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633163306533623338643637366533643166333233393732663735 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit: BPF prog-id=199 op=LOAD May 15 10:19:45.828000 audit[4461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3831 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633163306533623338643637366533643166333233393732663735 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit: BPF prog-id=200 op=LOAD May 15 10:19:45.828000 audit[4461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3831 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633163306533623338643637366533643166333233393732663735 May 15 10:19:45.828000 audit: BPF prog-id=200 op=UNLOAD May 15 10:19:45.828000 audit: BPF prog-id=199 op=UNLOAD May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { perfmon } for pid=4461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit[4461]: AVC avc: denied { bpf } for pid=4461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.828000 audit: BPF prog-id=201 op=LOAD May 15 10:19:45.828000 audit[4461]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3831 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436633163306533623338643637366533643166333233393732663735 May 15 10:19:45.860190 systemd[1]: Started cri-containerd-2249b46d9c03fcf59a68137ff054eec782e568619b0bb59aeb28aa8250181aba.scope. May 15 10:19:45.863357 env[1221]: time="2025-05-15T10:19:45.863251874Z" level=info msg="StartContainer for \"46c1c0e3b38d676e3d1f323972f75b04abbdca0f174e5ce3106bf3a5327f0149\" returns successfully" May 15 10:19:45.864345 sshd[4492]: Accepted publickey for core from 10.0.0.1 port 48042 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:45.863000 audit[4492]: USER_ACCT pid=4492 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.867000 audit[4492]: CRED_ACQ pid=4492 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.867000 audit[4492]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecc446d0 a2=3 a3=1 items=0 ppid=1 pid=4492 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.867000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:19:45.868622 sshd[4492]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:45.873120 systemd[1]: Started session-11.scope. May 15 10:19:45.873275 systemd-logind[1207]: New session 11 of user core. May 15 10:19:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.885000 audit: BPF prog-id=202 op=LOAD May 15 10:19:45.886000 audit[4492]: USER_START pid=4492 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400018db38 a2=10 a3=0 items=0 ppid=4414 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962343664396330336663663539613638313337666630353465 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400018d5a0 a2=3c a3=0 items=0 ppid=4414 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962343664396330336663663539613638313337666630353465 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit: BPF prog-id=203 op=LOAD May 15 10:19:45.886000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400018d8e0 a2=78 a3=0 items=0 ppid=4414 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962343664396330336663663539613638313337666630353465 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit: BPF prog-id=204 op=LOAD May 15 10:19:45.886000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400018d670 a2=78 a3=0 items=0 ppid=4414 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962343664396330336663663539613638313337666630353465 May 15 10:19:45.886000 audit: BPF prog-id=204 op=UNLOAD May 15 10:19:45.886000 audit: BPF prog-id=203 op=UNLOAD May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:45.886000 audit: BPF prog-id=205 op=LOAD May 15 10:19:45.886000 audit[4477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400018db40 a2=78 a3=0 items=0 ppid=4414 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962343664396330336663663539613638313337666630353465 May 15 10:19:45.887000 audit[4518]: CRED_ACQ pid=4518 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:45.914588 env[1221]: time="2025-05-15T10:19:45.914532978Z" level=info msg="StartContainer for \"2249b46d9c03fcf59a68137ff054eec782e568619b0bb59aeb28aa8250181aba\" returns successfully" May 15 10:19:45.933000 audit[4512]: AVC avc: denied { getattr } for pid=4512 comm="coredns" path="cgroup:[4026532345]" dev="nsfs" ino=4026532345 scontext=system_u:system_r:svirt_lxc_net_t:s0:c400,c936 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 15 10:19:45.933000 audit[4512]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=40005f0810 a2=40000da578 a3=0 items=0 ppid=4414 pid=4512 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c400,c936 key=(null) May 15 10:19:45.933000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 15 10:19:46.113879 sshd[4492]: pam_unix(sshd:session): session closed for user core May 15 10:19:46.117997 systemd[1]: Started sshd@11-10.0.0.84:22-10.0.0.1:48056.service. May 15 10:19:46.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.84:22-10.0.0.1:48056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:46.119000 audit[4492]: USER_END pid=4492 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:46.119000 audit[4492]: CRED_DISP pid=4492 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:46.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.84:22-10.0.0.1:48042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:46.122650 systemd[1]: sshd@10-10.0.0.84:22-10.0.0.1:48042.service: Deactivated successfully. May 15 10:19:46.123385 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:19:46.123710 systemd-logind[1207]: Session 11 logged out. Waiting for processes to exit. May 15 10:19:46.127233 systemd-logind[1207]: Removed session 11. May 15 10:19:46.155000 audit[4545]: USER_ACCT pid=4545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:46.157028 sshd[4545]: Accepted publickey for core from 10.0.0.1 port 48056 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:46.156000 audit[4545]: CRED_ACQ pid=4545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:46.156000 audit[4545]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3dfbf30 a2=3 a3=1 items=0 ppid=1 pid=4545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:46.156000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:19:46.158281 sshd[4545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:46.162417 systemd[1]: Started session-12.scope. May 15 10:19:46.162553 systemd-logind[1207]: New session 12 of user core. May 15 10:19:46.166000 audit[4545]: USER_START pid=4545 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:46.168000 audit[4548]: CRED_ACQ pid=4548 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:46.333839 sshd[4545]: pam_unix(sshd:session): session closed for user core May 15 10:19:46.335000 audit[4545]: USER_END pid=4545 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:46.335000 audit[4545]: CRED_DISP pid=4545 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:46.339363 systemd[1]: sshd@11-10.0.0.84:22-10.0.0.1:48056.service: Deactivated successfully. May 15 10:19:46.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.84:22-10.0.0.1:48056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:46.340069 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:19:46.340224 systemd-logind[1207]: Session 12 logged out. Waiting for processes to exit. May 15 10:19:46.340395 kubelet[1959]: E0515 10:19:46.340369 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:46.341050 systemd-logind[1207]: Removed session 12. May 15 10:19:46.348873 kubelet[1959]: I0515 10:19:46.348833 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:19:46.349261 kubelet[1959]: E0515 10:19:46.349228 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:46.371323 kubelet[1959]: I0515 10:19:46.371209 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-tkzfl" podStartSLOduration=33.37118252 podStartE2EDuration="33.37118252s" podCreationTimestamp="2025-05-15 10:19:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:19:46.358991685 +0000 UTC m=+39.298440758" watchObservedRunningTime="2025-05-15 10:19:46.37118252 +0000 UTC m=+39.310631553" May 15 10:19:46.383350 kubelet[1959]: I0515 10:19:46.383295 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-78d645f96f-nfvxb" podStartSLOduration=24.253157939 podStartE2EDuration="26.383279628s" podCreationTimestamp="2025-05-15 10:19:20 +0000 UTC" firstStartedPulling="2025-05-15 10:19:43.596761124 +0000 UTC m=+36.536210197" lastFinishedPulling="2025-05-15 10:19:45.726882813 +0000 UTC m=+38.666331886" observedRunningTime="2025-05-15 10:19:46.373563571 +0000 UTC m=+39.313012644" watchObservedRunningTime="2025-05-15 10:19:46.383279628 +0000 UTC m=+39.322728701" May 15 10:19:46.386070 systemd-networkd[1047]: calia68d11a7a35: Gained IPv6LL May 15 10:19:46.398214 kubelet[1959]: I0515 10:19:46.398138 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7d86bbcd9d-bbdtt" podStartSLOduration=25.480369734 podStartE2EDuration="27.398118173s" podCreationTimestamp="2025-05-15 10:19:19 +0000 UTC" firstStartedPulling="2025-05-15 10:19:43.538759265 +0000 UTC m=+36.478208338" lastFinishedPulling="2025-05-15 10:19:45.456507704 +0000 UTC m=+38.395956777" observedRunningTime="2025-05-15 10:19:46.397667701 +0000 UTC m=+39.337116734" watchObservedRunningTime="2025-05-15 10:19:46.398118173 +0000 UTC m=+39.337567246" May 15 10:19:46.410000 audit[4560]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:46.410000 audit[4560]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffdf336b60 a2=0 a3=1 items=0 ppid=2108 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:46.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:46.426000 audit[4560]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:46.426000 audit[4560]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffdf336b60 a2=0 a3=1 items=0 ppid=2108 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:46.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:46.707176 systemd-networkd[1047]: cali3671b14ea21: Gained IPv6LL May 15 10:19:46.903000 audit[4286]: AVC avc: denied { watch } for pid=4286 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_19_28.3352301023/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c114,c283 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c114,c283 tclass=file permissive=0 May 15 10:19:46.903000 audit[4286]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40011a01a0 a2=fc6 a3=0 items=0 ppid=3608 pid=4286 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c114,c283 key=(null) May 15 10:19:46.903000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:19:46.946254 env[1221]: time="2025-05-15T10:19:46.946195541Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:46.948066 env[1221]: time="2025-05-15T10:19:46.948024192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:46.949958 env[1221]: time="2025-05-15T10:19:46.949921208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:46.953455 env[1221]: time="2025-05-15T10:19:46.953423179Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:46.954182 env[1221]: time="2025-05-15T10:19:46.954152871Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 15 10:19:46.955157 env[1221]: time="2025-05-15T10:19:46.955130782Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:19:46.956186 env[1221]: time="2025-05-15T10:19:46.956145574Z" level=info msg="CreateContainer within sandbox \"44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:19:46.973630 env[1221]: time="2025-05-15T10:19:46.973591226Z" level=info msg="CreateContainer within sandbox \"44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c6c2934a801ad3fd295701921eaf55406a1c4cebcb70ea90b2765d8cd747f997\"" May 15 10:19:46.976810 env[1221]: time="2025-05-15T10:19:46.976774375Z" level=info msg="StartContainer for \"c6c2934a801ad3fd295701921eaf55406a1c4cebcb70ea90b2765d8cd747f997\"" May 15 10:19:47.000863 systemd[1]: Started cri-containerd-c6c2934a801ad3fd295701921eaf55406a1c4cebcb70ea90b2765d8cd747f997.scope. May 15 10:19:47.007000 audit[4483]: AVC avc: denied { watch } for pid=4483 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_19_28.3621060037/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c735,c882 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c735,c882 tclass=file permissive=0 May 15 10:19:47.007000 audit[4483]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40014a9fa0 a2=fc6 a3=0 items=0 ppid=3831 pid=4483 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c735,c882 key=(null) May 15 10:19:47.007000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4065 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:47.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336633239333461383031616433666432393537303139323165616635 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit: BPF prog-id=206 op=LOAD May 15 10:19:47.059000 audit[4568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4065 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:47.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336633239333461383031616433666432393537303139323165616635 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit: BPF prog-id=207 op=LOAD May 15 10:19:47.059000 audit[4568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4065 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:47.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336633239333461383031616433666432393537303139323165616635 May 15 10:19:47.059000 audit: BPF prog-id=207 op=UNLOAD May 15 10:19:47.059000 audit: BPF prog-id=206 op=UNLOAD May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { perfmon } for pid=4568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit[4568]: AVC avc: denied { bpf } for pid=4568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:47.059000 audit: BPF prog-id=208 op=LOAD May 15 10:19:47.059000 audit[4568]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4065 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:47.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336633239333461383031616433666432393537303139323165616635 May 15 10:19:47.079000 audit[4365]: AVC avc: denied { watch } for pid=4365 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_19_28.3039541147/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c298,c805 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c298,c805 tclass=file permissive=0 May 15 10:19:47.079000 audit[4365]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40003ca1a0 a2=fc6 a3=0 items=0 ppid=3775 pid=4365 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c298,c805 key=(null) May 15 10:19:47.079000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:19:47.084640 env[1221]: time="2025-05-15T10:19:47.084591392Z" level=info msg="StartContainer for \"c6c2934a801ad3fd295701921eaf55406a1c4cebcb70ea90b2765d8cd747f997\" returns successfully" May 15 10:19:47.350229 kubelet[1959]: I0515 10:19:47.350124 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:19:47.350229 kubelet[1959]: I0515 10:19:47.350190 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:19:47.351289 kubelet[1959]: E0515 10:19:47.351259 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:47.351370 kubelet[1959]: E0515 10:19:47.351262 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:47.541081 systemd-networkd[1047]: cali44a0348ad89: Gained IPv6LL May 15 10:19:48.352509 kubelet[1959]: E0515 10:19:48.352453 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:48.629329 env[1221]: time="2025-05-15T10:19:48.629205295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:48.631066 env[1221]: time="2025-05-15T10:19:48.631016739Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:48.633861 env[1221]: time="2025-05-15T10:19:48.633818889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:48.635533 env[1221]: time="2025-05-15T10:19:48.635508484Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:48.636117 env[1221]: time="2025-05-15T10:19:48.636076843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:ec7c64189a2fd01b24b044fea1840d441e9884a0df32c2e9d6982cfbbea1f814\"" May 15 10:19:48.637473 env[1221]: time="2025-05-15T10:19:48.637246883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:19:48.648954 env[1221]: time="2025-05-15T10:19:48.648821231Z" level=info msg="CreateContainer within sandbox \"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:19:48.665339 env[1221]: time="2025-05-15T10:19:48.665278511Z" level=info msg="CreateContainer within sandbox \"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\"" May 15 10:19:48.665750 env[1221]: time="2025-05-15T10:19:48.665724902Z" level=info msg="StartContainer for \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\"" May 15 10:19:48.682097 systemd[1]: Started cri-containerd-57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33.scope. May 15 10:19:48.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.728000 audit: BPF prog-id=209 op=LOAD May 15 10:19:48.729000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4119 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:48.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633730363331636438333431373063623061663639393562383162 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4119 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:48.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633730363331636438333431373063623061663639393562383162 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.729000 audit: BPF prog-id=210 op=LOAD May 15 10:19:48.729000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4119 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:48.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633730363331636438333431373063623061663639393562383162 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.730000 audit: BPF prog-id=211 op=LOAD May 15 10:19:48.730000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4119 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:48.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633730363331636438333431373063623061663639393562383162 May 15 10:19:48.730000 audit: BPF prog-id=211 op=UNLOAD May 15 10:19:48.731000 audit: BPF prog-id=210 op=UNLOAD May 15 10:19:48.731000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:48.731000 audit: BPF prog-id=212 op=LOAD May 15 10:19:48.731000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4119 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:48.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633730363331636438333431373063623061663639393562383162 May 15 10:19:48.768143 env[1221]: time="2025-05-15T10:19:48.768052188Z" level=info msg="StartContainer for \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\" returns successfully" May 15 10:19:49.379290 kubelet[1959]: I0515 10:19:49.379225 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7f98dd9fcb-7tgjn" podStartSLOduration=25.513765652 podStartE2EDuration="29.379206325s" podCreationTimestamp="2025-05-15 10:19:20 +0000 UTC" firstStartedPulling="2025-05-15 10:19:44.771687322 +0000 UTC m=+37.711136395" lastFinishedPulling="2025-05-15 10:19:48.637127995 +0000 UTC m=+41.576577068" observedRunningTime="2025-05-15 10:19:49.377772869 +0000 UTC m=+42.317221902" watchObservedRunningTime="2025-05-15 10:19:49.379206325 +0000 UTC m=+42.318655398" May 15 10:19:50.418495 env[1221]: time="2025-05-15T10:19:50.418436127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:50.419934 env[1221]: time="2025-05-15T10:19:50.419896581Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:50.421554 env[1221]: time="2025-05-15T10:19:50.421529287Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:50.422958 env[1221]: time="2025-05-15T10:19:50.422913217Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:50.423369 env[1221]: time="2025-05-15T10:19:50.423331924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 15 10:19:50.425820 env[1221]: time="2025-05-15T10:19:50.425672916Z" level=info msg="CreateContainer within sandbox \"44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:19:50.438781 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4273531781.mount: Deactivated successfully. May 15 10:19:50.444251 env[1221]: time="2025-05-15T10:19:50.444213998Z" level=info msg="CreateContainer within sandbox \"44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"1a788be3ef3f70d7e9176f22f30a94a21669558f877ab65d022b5a939a2e509b\"" May 15 10:19:50.444873 env[1221]: time="2025-05-15T10:19:50.444844919Z" level=info msg="StartContainer for \"1a788be3ef3f70d7e9176f22f30a94a21669558f877ab65d022b5a939a2e509b\"" May 15 10:19:50.465254 systemd[1]: Started cri-containerd-1a788be3ef3f70d7e9176f22f30a94a21669558f877ab65d022b5a939a2e509b.scope. May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.487189 kernel: kauditd_printk_skb: 441 callbacks suppressed May 15 10:19:50.487260 kernel: audit: type=1400 audit(1747304390.485:1411): avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4065 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.491823 kernel: audit: type=1300 audit(1747304390.485:1411): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4065 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.491879 kernel: audit: type=1327 audit(1747304390.485:1411): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373838626533656633663730643765393137366632326633306139 May 15 10:19:50.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373838626533656633663730643765393137366632326633306139 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.496095 kernel: audit: type=1400 audit(1747304390.485:1412): avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.496155 kernel: audit: type=1400 audit(1747304390.485:1412): avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.500401 kernel: audit: type=1400 audit(1747304390.485:1412): avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.503427 kernel: audit: type=1400 audit(1747304390.485:1412): avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.503529 kernel: audit: type=1400 audit(1747304390.485:1412): avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.507213 kernel: audit: type=1400 audit(1747304390.485:1412): avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.507287 kernel: audit: type=1400 audit(1747304390.485:1412): avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit: BPF prog-id=213 op=LOAD May 15 10:19:50.485000 audit[4676]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4065 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373838626533656633663730643765393137366632326633306139 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.485000 audit: BPF prog-id=214 op=LOAD May 15 10:19:50.485000 audit[4676]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4065 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373838626533656633663730643765393137366632326633306139 May 15 10:19:50.486000 audit: BPF prog-id=214 op=UNLOAD May 15 10:19:50.486000 audit: BPF prog-id=213 op=UNLOAD May 15 10:19:50.486000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.486000 audit: BPF prog-id=215 op=LOAD May 15 10:19:50.486000 audit[4676]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4065 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161373838626533656633663730643765393137366632326633306139 May 15 10:19:50.513468 env[1221]: time="2025-05-15T10:19:50.513426806Z" level=info msg="StartContainer for \"1a788be3ef3f70d7e9176f22f30a94a21669558f877ab65d022b5a939a2e509b\" returns successfully" May 15 10:19:50.643790 systemd[1]: run-containerd-runc-k8s.io-1a788be3ef3f70d7e9176f22f30a94a21669558f877ab65d022b5a939a2e509b-runc.HXnSom.mount: Deactivated successfully. May 15 10:19:51.243527 kubelet[1959]: I0515 10:19:51.243492 1959 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:19:51.243527 kubelet[1959]: I0515 10:19:51.243528 1959 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:19:51.338430 systemd[1]: Started sshd@12-10.0.0.84:22-10.0.0.1:48068.service. May 15 10:19:51.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.84:22-10.0.0.1:48068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:51.377000 audit[4709]: USER_ACCT pid=4709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:51.378202 sshd[4709]: Accepted publickey for core from 10.0.0.1 port 48068 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:51.378000 audit[4709]: CRED_ACQ pid=4709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:51.378000 audit[4709]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb4d55a0 a2=3 a3=1 items=0 ppid=1 pid=4709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.378000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:19:51.380073 sshd[4709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:51.389448 systemd[1]: Started session-13.scope. May 15 10:19:51.390339 systemd-logind[1207]: New session 13 of user core. May 15 10:19:51.400000 audit[4709]: USER_START pid=4709 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:51.402000 audit[4711]: CRED_ACQ pid=4711 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:51.542713 sshd[4709]: pam_unix(sshd:session): session closed for user core May 15 10:19:51.543000 audit[4709]: USER_END pid=4709 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:51.543000 audit[4709]: CRED_DISP pid=4709 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:51.545662 systemd-logind[1207]: Session 13 logged out. Waiting for processes to exit. May 15 10:19:51.545819 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:19:51.546681 systemd-logind[1207]: Removed session 13. May 15 10:19:51.546938 systemd[1]: sshd@12-10.0.0.84:22-10.0.0.1:48068.service: Deactivated successfully. May 15 10:19:51.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.84:22-10.0.0.1:48068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:56.548643 systemd[1]: Started sshd@13-10.0.0.84:22-10.0.0.1:57042.service. May 15 10:19:56.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.84:22-10.0.0.1:57042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:56.550376 kernel: kauditd_printk_skb: 44 callbacks suppressed May 15 10:19:56.550449 kernel: audit: type=1130 audit(1747304396.548:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.84:22-10.0.0.1:57042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:56.584000 audit[4724]: USER_ACCT pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.585526 sshd[4724]: Accepted publickey for core from 10.0.0.1 port 57042 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:56.587617 sshd[4724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:56.585000 audit[4724]: CRED_ACQ pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.590519 kernel: audit: type=1101 audit(1747304396.584:1427): pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.590583 kernel: audit: type=1103 audit(1747304396.585:1428): pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.592155 systemd-logind[1207]: New session 14 of user core. May 15 10:19:56.596918 kernel: audit: type=1006 audit(1747304396.585:1429): pid=4724 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 10:19:56.597003 kernel: audit: type=1300 audit(1747304396.585:1429): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe68a5f90 a2=3 a3=1 items=0 ppid=1 pid=4724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:56.585000 audit[4724]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe68a5f90 a2=3 a3=1 items=0 ppid=1 pid=4724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:56.593308 systemd[1]: Started session-14.scope. May 15 10:19:56.585000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:19:56.602028 kernel: audit: type=1327 audit(1747304396.585:1429): proctitle=737368643A20636F7265205B707269765D May 15 10:19:56.601000 audit[4724]: USER_START pid=4724 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.609057 kernel: audit: type=1105 audit(1747304396.601:1430): pid=4724 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.608000 audit[4726]: CRED_ACQ pid=4726 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.613889 kernel: audit: type=1103 audit(1747304396.608:1431): pid=4726 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.729614 sshd[4724]: pam_unix(sshd:session): session closed for user core May 15 10:19:56.729000 audit[4724]: USER_END pid=4724 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.732222 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:19:56.732832 systemd-logind[1207]: Session 14 logged out. Waiting for processes to exit. May 15 10:19:56.732989 systemd[1]: sshd@13-10.0.0.84:22-10.0.0.1:57042.service: Deactivated successfully. May 15 10:19:56.729000 audit[4724]: CRED_DISP pid=4724 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.734142 systemd-logind[1207]: Removed session 14. May 15 10:19:56.736269 kernel: audit: type=1106 audit(1747304396.729:1432): pid=4724 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.736327 kernel: audit: type=1104 audit(1747304396.729:1433): pid=4724 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:56.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.84:22-10.0.0.1:57042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:57.861431 kubelet[1959]: I0515 10:19:57.861380 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:19:57.881469 kubelet[1959]: I0515 10:19:57.881399 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-76scb" podStartSLOduration=32.136517798 podStartE2EDuration="37.881381309s" podCreationTimestamp="2025-05-15 10:19:20 +0000 UTC" firstStartedPulling="2025-05-15 10:19:44.679437836 +0000 UTC m=+37.618886909" lastFinishedPulling="2025-05-15 10:19:50.424301347 +0000 UTC m=+43.363750420" observedRunningTime="2025-05-15 10:19:51.381481454 +0000 UTC m=+44.320930527" watchObservedRunningTime="2025-05-15 10:19:57.881381309 +0000 UTC m=+50.820830382" May 15 10:19:57.901000 audit[4745]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:57.901000 audit[4745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffedf343f0 a2=0 a3=1 items=0 ppid=2108 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:57.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:57.907000 audit[4745]: NETFILTER_CFG table=nat:115 family=2 entries=27 op=nft_register_chain pid=4745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:57.907000 audit[4745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffedf343f0 a2=0 a3=1 items=0 ppid=2108 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:57.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:01.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.84:22-10.0.0.1:57048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:01.735840 systemd[1]: Started sshd@14-10.0.0.84:22-10.0.0.1:57048.service. May 15 10:20:01.739569 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 10:20:01.739667 kernel: audit: type=1130 audit(1747304401.735:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.84:22-10.0.0.1:57048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:01.775000 audit[4748]: USER_ACCT pid=4748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.777821 sshd[4748]: Accepted publickey for core from 10.0.0.1 port 57048 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:01.779121 sshd[4748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:01.776000 audit[4748]: CRED_ACQ pid=4748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.782659 kernel: audit: type=1101 audit(1747304401.775:1438): pid=4748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.782726 kernel: audit: type=1103 audit(1747304401.776:1439): pid=4748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.782835 kernel: audit: type=1006 audit(1747304401.776:1440): pid=4748 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 10:20:01.776000 audit[4748]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfeca660 a2=3 a3=1 items=0 ppid=1 pid=4748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:01.784838 systemd-logind[1207]: New session 15 of user core. May 15 10:20:01.785369 systemd[1]: Started session-15.scope. May 15 10:20:01.786710 kernel: audit: type=1300 audit(1747304401.776:1440): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfeca660 a2=3 a3=1 items=0 ppid=1 pid=4748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:01.786767 kernel: audit: type=1327 audit(1747304401.776:1440): proctitle=737368643A20636F7265205B707269765D May 15 10:20:01.776000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:01.788000 audit[4748]: USER_START pid=4748 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.789000 audit[4750]: CRED_ACQ pid=4750 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.795379 kernel: audit: type=1105 audit(1747304401.788:1441): pid=4748 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.795433 kernel: audit: type=1103 audit(1747304401.789:1442): pid=4750 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.946656 sshd[4748]: pam_unix(sshd:session): session closed for user core May 15 10:20:01.945000 audit[4748]: USER_END pid=4748 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.945000 audit[4748]: CRED_DISP pid=4748 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.950493 systemd[1]: sshd@14-10.0.0.84:22-10.0.0.1:57048.service: Deactivated successfully. May 15 10:20:01.951302 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:20:01.952108 systemd-logind[1207]: Session 15 logged out. Waiting for processes to exit. May 15 10:20:01.954228 kernel: audit: type=1106 audit(1747304401.945:1443): pid=4748 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.954288 kernel: audit: type=1104 audit(1747304401.945:1444): pid=4748 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:01.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.84:22-10.0.0.1:57048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:01.954459 systemd-logind[1207]: Removed session 15. May 15 10:20:03.677000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:03.677000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002d78900 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:03.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:03.677000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:03.677000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400300a840 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:03.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:04.623000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:04.623000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:04.623000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=40079df040 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:20:04.623000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=400a1b4240 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:20:04.623000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:20:04.623000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:20:04.623000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7302 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:04.623000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4009a1fa10 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:20:04.623000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:20:04.646000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7308 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:04.646000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4009582990 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:20:04.646000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:20:04.654000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:04.654000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400a0b8320 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:20:04.654000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:20:04.660000 audit[1826]: AVC avc: denied { watch } for pid=1826 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:04.660000 audit[1826]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400a35e420 a2=fc6 a3=0 items=0 ppid=1674 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c380,c978 key=(null) May 15 10:20:04.660000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:20:05.320204 kubelet[1959]: I0515 10:20:05.320163 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:20:05.353000 audit[4763]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4763 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:05.353000 audit[4763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffdde97f80 a2=0 a3=1 items=0 ppid=2108 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:05.362250 kubelet[1959]: I0515 10:20:05.362197 1959 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:20:05.362860 env[1221]: time="2025-05-15T10:20:05.362808373Z" level=info msg="StopContainer for \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\" with timeout 30 (s)" May 15 10:20:05.363228 env[1221]: time="2025-05-15T10:20:05.363196232Z" level=info msg="Stop container \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\" with signal terminated" May 15 10:20:05.363000 audit[4763]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=4763 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:05.363000 audit[4763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffdde97f80 a2=0 a3=1 items=0 ppid=2108 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:05.376004 systemd[1]: cri-containerd-4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0.scope: Deactivated successfully. May 15 10:20:05.376364 systemd[1]: cri-containerd-4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0.scope: Consumed 1.154s CPU time. May 15 10:20:05.375000 audit: BPF prog-id=186 op=UNLOAD May 15 10:20:05.382000 audit: BPF prog-id=189 op=UNLOAD May 15 10:20:05.391000 audit[4779]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:05.391000 audit[4779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffffddbac20 a2=0 a3=1 items=0 ppid=2108 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:05.397000 audit[4779]: NETFILTER_CFG table=nat:119 family=2 entries=36 op=nft_register_rule pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:05.397000 audit[4779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffffddbac20 a2=0 a3=1 items=0 ppid=2108 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:05.410318 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0-rootfs.mount: Deactivated successfully. May 15 10:20:05.411002 env[1221]: time="2025-05-15T10:20:05.410948954Z" level=info msg="shim disconnected" id=4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0 May 15 10:20:05.411080 env[1221]: time="2025-05-15T10:20:05.411004356Z" level=warning msg="cleaning up after shim disconnected" id=4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0 namespace=k8s.io May 15 10:20:05.411080 env[1221]: time="2025-05-15T10:20:05.411013877Z" level=info msg="cleaning up dead shim" May 15 10:20:05.423599 env[1221]: time="2025-05-15T10:20:05.423541987Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4784 runtime=io.containerd.runc.v2\n" May 15 10:20:05.452380 env[1221]: time="2025-05-15T10:20:05.452325714Z" level=info msg="StopContainer for \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\" returns successfully" May 15 10:20:05.454153 env[1221]: time="2025-05-15T10:20:05.454127005Z" level=info msg="StopPodSandbox for \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\"" May 15 10:20:05.454221 env[1221]: time="2025-05-15T10:20:05.454190368Z" level=info msg="Container to stop \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:20:05.456678 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761-shm.mount: Deactivated successfully. May 15 10:20:05.463601 systemd[1]: cri-containerd-078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761.scope: Deactivated successfully. May 15 10:20:05.462000 audit: BPF prog-id=158 op=UNLOAD May 15 10:20:05.468000 audit: BPF prog-id=161 op=UNLOAD May 15 10:20:05.480300 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761-rootfs.mount: Deactivated successfully. May 15 10:20:05.481066 env[1221]: time="2025-05-15T10:20:05.480848789Z" level=info msg="shim disconnected" id=078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761 May 15 10:20:05.481066 env[1221]: time="2025-05-15T10:20:05.480897391Z" level=warning msg="cleaning up after shim disconnected" id=078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761 namespace=k8s.io May 15 10:20:05.481066 env[1221]: time="2025-05-15T10:20:05.480908272Z" level=info msg="cleaning up dead shim" May 15 10:20:05.488301 env[1221]: time="2025-05-15T10:20:05.488258801Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4814 runtime=io.containerd.runc.v2\n" May 15 10:20:05.539662 systemd-networkd[1047]: cali1689dd60f19: Link DOWN May 15 10:20:05.539668 systemd-networkd[1047]: cali1689dd60f19: Lost carrier May 15 10:20:05.547000 audit[4857]: NETFILTER_CFG table=filter:120 family=2 entries=48 op=nft_register_rule pid=4857 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:05.547000 audit[4857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7756 a0=3 a1=ffffcb3e9c60 a2=0 a3=ffffa7b4ffa8 items=0 ppid=3299 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:05.547000 audit[4857]: NETFILTER_CFG table=filter:121 family=2 entries=2 op=nft_unregister_chain pid=4857 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:05.547000 audit[4857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffcb3e9c60 a2=0 a3=ffffa7b4ffa8 items=0 ppid=3299 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.535 [INFO][4843] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.535 [INFO][4843] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" iface="eth0" netns="/var/run/netns/cni-a7609709-a841-406d-3980-d26375b8b120" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.539 [INFO][4843] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" iface="eth0" netns="/var/run/netns/cni-a7609709-a841-406d-3980-d26375b8b120" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.550 [INFO][4843] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" after=14.293239ms iface="eth0" netns="/var/run/netns/cni-a7609709-a841-406d-3980-d26375b8b120" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.550 [INFO][4843] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.550 [INFO][4843] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.575 [INFO][4859] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.575 [INFO][4859] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.575 [INFO][4859] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.608 [INFO][4859] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.608 [INFO][4859] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.610 [INFO][4859] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:05.613196 env[1221]: 2025-05-15 10:20:05.611 [INFO][4843] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:05.616310 env[1221]: time="2025-05-15T10:20:05.616139312Z" level=info msg="TearDown network for sandbox \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\" successfully" May 15 10:20:05.616310 env[1221]: time="2025-05-15T10:20:05.616184074Z" level=info msg="StopPodSandbox for \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\" returns successfully" May 15 10:20:05.616205 systemd[1]: run-netns-cni\x2da7609709\x2da841\x2d406d\x2d3980\x2dd26375b8b120.mount: Deactivated successfully. May 15 10:20:05.617449 env[1221]: time="2025-05-15T10:20:05.617419096Z" level=info msg="StopPodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\"" May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.655 [WARNING][4880] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0", GenerateName:"calico-apiserver-7d86bbcd9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b12bc62-9412-4685-b095-bcca74cee564", ResourceVersion:"1141", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d86bbcd9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761", Pod:"calico-apiserver-7d86bbcd9d-t2rkl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1689dd60f19", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.655 [INFO][4880] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.655 [INFO][4880] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" iface="eth0" netns="" May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.655 [INFO][4880] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.655 [INFO][4880] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.673 [INFO][4888] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.673 [INFO][4888] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.673 [INFO][4888] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.682 [WARNING][4888] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.682 [INFO][4888] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.683 [INFO][4888] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:05.686494 env[1221]: 2025-05-15 10:20:05.685 [INFO][4880] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:05.687217 env[1221]: time="2025-05-15T10:20:05.687181764Z" level=info msg="TearDown network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" successfully" May 15 10:20:05.687288 env[1221]: time="2025-05-15T10:20:05.687272009Z" level=info msg="StopPodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" returns successfully" May 15 10:20:05.699147 kubelet[1959]: I0515 10:20:05.699103 1959 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-n799l\" (UniqueName: \"kubernetes.io/projected/9b12bc62-9412-4685-b095-bcca74cee564-kube-api-access-n799l\") pod \"9b12bc62-9412-4685-b095-bcca74cee564\" (UID: \"9b12bc62-9412-4685-b095-bcca74cee564\") " May 15 10:20:05.699500 kubelet[1959]: I0515 10:20:05.699316 1959 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9b12bc62-9412-4685-b095-bcca74cee564-calico-apiserver-certs\") pod \"9b12bc62-9412-4685-b095-bcca74cee564\" (UID: \"9b12bc62-9412-4685-b095-bcca74cee564\") " May 15 10:20:05.706808 kubelet[1959]: I0515 10:20:05.706775 1959 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/9b12bc62-9412-4685-b095-bcca74cee564-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "9b12bc62-9412-4685-b095-bcca74cee564" (UID: "9b12bc62-9412-4685-b095-bcca74cee564"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 15 10:20:05.708203 systemd[1]: var-lib-kubelet-pods-9b12bc62\x2d9412\x2d4685\x2db095\x2dbcca74cee564-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 15 10:20:05.709720 kubelet[1959]: I0515 10:20:05.709676 1959 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/9b12bc62-9412-4685-b095-bcca74cee564-kube-api-access-n799l" (OuterVolumeSpecName: "kube-api-access-n799l") pod "9b12bc62-9412-4685-b095-bcca74cee564" (UID: "9b12bc62-9412-4685-b095-bcca74cee564"). InnerVolumeSpecName "kube-api-access-n799l". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 15 10:20:05.800076 kubelet[1959]: I0515 10:20:05.800038 1959 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-n799l\" (UniqueName: \"kubernetes.io/projected/9b12bc62-9412-4685-b095-bcca74cee564-kube-api-access-n799l\") on node \"localhost\" DevicePath \"\"" May 15 10:20:05.800264 kubelet[1959]: I0515 10:20:05.800251 1959 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9b12bc62-9412-4685-b095-bcca74cee564-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 15 10:20:06.399275 kubelet[1959]: I0515 10:20:06.399247 1959 scope.go:117] "RemoveContainer" containerID="4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0" May 15 10:20:06.400993 env[1221]: time="2025-05-15T10:20:06.400932192Z" level=info msg="RemoveContainer for \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\"" May 15 10:20:06.404516 systemd[1]: Removed slice kubepods-besteffort-pod9b12bc62_9412_4685_b095_bcca74cee564.slice. May 15 10:20:06.404600 systemd[1]: kubepods-besteffort-pod9b12bc62_9412_4685_b095_bcca74cee564.slice: Consumed 1.179s CPU time. May 15 10:20:06.406109 env[1221]: time="2025-05-15T10:20:06.406079808Z" level=info msg="RemoveContainer for \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\" returns successfully" May 15 10:20:06.406508 kubelet[1959]: I0515 10:20:06.406480 1959 scope.go:117] "RemoveContainer" containerID="4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0" May 15 10:20:06.406860 env[1221]: time="2025-05-15T10:20:06.406732520Z" level=error msg="ContainerStatus for \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\": not found" May 15 10:20:06.408993 kubelet[1959]: E0515 10:20:06.407098 1959 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\": not found" containerID="4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0" May 15 10:20:06.408993 kubelet[1959]: I0515 10:20:06.407130 1959 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0"} err="failed to get container status \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\": rpc error: code = NotFound desc = an error occurred when try to find container \"4568e3040b89aeebb85c964c451d054d637b82defbbb25adaacff25ae9f692e0\": not found" May 15 10:20:06.410147 systemd[1]: var-lib-kubelet-pods-9b12bc62\x2d9412\x2d4685\x2db095\x2dbcca74cee564-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dn799l.mount: Deactivated successfully. May 15 10:20:06.411000 audit[4898]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:06.411000 audit[4898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffef1a2410 a2=0 a3=1 items=0 ppid=2108 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:06.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:06.417000 audit[4898]: NETFILTER_CFG table=nat:123 family=2 entries=36 op=nft_register_rule pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:06.417000 audit[4898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffef1a2410 a2=0 a3=1 items=0 ppid=2108 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:06.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:06.951457 systemd[1]: Started sshd@15-10.0.0.84:22-10.0.0.1:45672.service. May 15 10:20:06.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.84:22-10.0.0.1:45672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:06.955230 kernel: kauditd_printk_skb: 53 callbacks suppressed May 15 10:20:06.955317 kernel: audit: type=1130 audit(1747304406.950:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.84:22-10.0.0.1:45672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:06.986000 audit[4900]: USER_ACCT pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:06.987000 audit[4900]: CRED_ACQ pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:06.989066 sshd[4900]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:06.991074 sshd[4900]: Accepted publickey for core from 10.0.0.1 port 45672 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:06.992741 kernel: audit: type=1101 audit(1747304406.986:1467): pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:06.992793 kernel: audit: type=1103 audit(1747304406.987:1468): pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:06.992813 kernel: audit: type=1006 audit(1747304406.987:1469): pid=4900 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 10:20:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3d626a0 a2=3 a3=1 items=0 ppid=1 pid=4900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:06.996706 kernel: audit: type=1300 audit(1747304406.987:1469): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3d626a0 a2=3 a3=1 items=0 ppid=1 pid=4900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:06.987000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:06.997642 kernel: audit: type=1327 audit(1747304406.987:1469): proctitle=737368643A20636F7265205B707269765D May 15 10:20:06.997738 systemd-logind[1207]: New session 16 of user core. May 15 10:20:06.998589 systemd[1]: Started session-16.scope. May 15 10:20:07.001000 audit[4900]: USER_START pid=4900 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:07.002000 audit[4902]: CRED_ACQ pid=4902 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:07.006879 kernel: audit: type=1105 audit(1747304407.001:1470): pid=4900 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:07.006933 kernel: audit: type=1103 audit(1747304407.002:1471): pid=4902 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:07.125175 sshd[4900]: pam_unix(sshd:session): session closed for user core May 15 10:20:07.125000 audit[4900]: USER_END pid=4900 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:07.128271 systemd[1]: sshd@15-10.0.0.84:22-10.0.0.1:45672.service: Deactivated successfully. May 15 10:20:07.129022 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:20:07.125000 audit[4900]: CRED_DISP pid=4900 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:07.129520 systemd-logind[1207]: Session 16 logged out. Waiting for processes to exit. May 15 10:20:07.130425 systemd-logind[1207]: Removed session 16. May 15 10:20:07.131454 kernel: audit: type=1106 audit(1747304407.125:1472): pid=4900 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:07.131499 kernel: audit: type=1104 audit(1747304407.125:1473): pid=4900 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:07.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.84:22-10.0.0.1:45672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:07.172587 env[1221]: time="2025-05-15T10:20:07.172546873Z" level=info msg="StopPodSandbox for \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\"" May 15 10:20:07.195890 kubelet[1959]: I0515 10:20:07.195848 1959 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="9b12bc62-9412-4685-b095-bcca74cee564" path="/var/lib/kubelet/pods/9b12bc62-9412-4685-b095-bcca74cee564/volumes" May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.208 [WARNING][4928] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0", GenerateName:"calico-apiserver-7d86bbcd9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"8b88ee4d-c3b4-4f30-b96e-f1e11842e59b", ResourceVersion:"1074", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d86bbcd9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496", Pod:"calico-apiserver-7d86bbcd9d-bbdtt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf79e32aec0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.208 [INFO][4928] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.208 [INFO][4928] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" iface="eth0" netns="" May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.208 [INFO][4928] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.208 [INFO][4928] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.231 [INFO][4938] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.231 [INFO][4938] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.231 [INFO][4938] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.240 [WARNING][4938] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.240 [INFO][4938] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.241 [INFO][4938] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.244238 env[1221]: 2025-05-15 10:20:07.243 [INFO][4928] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:20:07.244764 env[1221]: time="2025-05-15T10:20:07.244270642Z" level=info msg="TearDown network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\" successfully" May 15 10:20:07.244764 env[1221]: time="2025-05-15T10:20:07.244302403Z" level=info msg="StopPodSandbox for \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\" returns successfully" May 15 10:20:07.245013 env[1221]: time="2025-05-15T10:20:07.244963276Z" level=info msg="RemovePodSandbox for \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\"" May 15 10:20:07.245062 env[1221]: time="2025-05-15T10:20:07.245023919Z" level=info msg="Forcibly stopping sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\"" May 15 10:20:07.314863 systemd[1]: run-containerd-runc-k8s.io-65a93ddac7be5ca0ab552de2387bd218382689865bf99a2ea0252d6640e85414-runc.61eSDJ.mount: Deactivated successfully. May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.278 [WARNING][4961] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0", GenerateName:"calico-apiserver-7d86bbcd9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"8b88ee4d-c3b4-4f30-b96e-f1e11842e59b", ResourceVersion:"1074", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d86bbcd9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"60f4b0820bcf04695fba1aececfca7cd23cde2a165885e88a615e934143b9496", Pod:"calico-apiserver-7d86bbcd9d-bbdtt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf79e32aec0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.278 [INFO][4961] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.279 [INFO][4961] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" iface="eth0" netns="" May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.279 [INFO][4961] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.279 [INFO][4961] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.298 [INFO][4969] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.298 [INFO][4969] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.298 [INFO][4969] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.315 [WARNING][4969] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.315 [INFO][4969] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" HandleID="k8s-pod-network.19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--bbdtt-eth0" May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.317 [INFO][4969] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.320876 env[1221]: 2025-05-15 10:20:07.319 [INFO][4961] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88" May 15 10:20:07.321336 env[1221]: time="2025-05-15T10:20:07.320903853Z" level=info msg="TearDown network for sandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\" successfully" May 15 10:20:07.324014 env[1221]: time="2025-05-15T10:20:07.323814196Z" level=info msg="RemovePodSandbox \"19da178b7aee11fe2dc67ce5d88e3ef6540361bb79b08a492863a5c6fa773f88\" returns successfully" May 15 10:20:07.324434 env[1221]: time="2025-05-15T10:20:07.324400425Z" level=info msg="StopPodSandbox for \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\"" May 15 10:20:07.389557 kubelet[1959]: E0515 10:20:07.389527 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.366 [WARNING][5010] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.366 [INFO][5010] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.366 [INFO][5010] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" iface="eth0" netns="" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.366 [INFO][5010] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.366 [INFO][5010] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.402 [INFO][5024] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.402 [INFO][5024] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.402 [INFO][5024] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.424 [WARNING][5024] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.425 [INFO][5024] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.444 [INFO][5024] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.447251 env[1221]: 2025-05-15 10:20:07.446 [INFO][5010] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:07.447933 env[1221]: time="2025-05-15T10:20:07.447893781Z" level=info msg="TearDown network for sandbox \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\" successfully" May 15 10:20:07.448029 env[1221]: time="2025-05-15T10:20:07.448010267Z" level=info msg="StopPodSandbox for \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\" returns successfully" May 15 10:20:07.448672 env[1221]: time="2025-05-15T10:20:07.448644658Z" level=info msg="RemovePodSandbox for \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\"" May 15 10:20:07.448816 env[1221]: time="2025-05-15T10:20:07.448776505Z" level=info msg="Forcibly stopping sandbox \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\"" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.483 [WARNING][5047] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.483 [INFO][5047] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.483 [INFO][5047] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" iface="eth0" netns="" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.483 [INFO][5047] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.484 [INFO][5047] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.501 [INFO][5055] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.501 [INFO][5055] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.501 [INFO][5055] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.510 [WARNING][5055] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.510 [INFO][5055] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" HandleID="k8s-pod-network.078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.511 [INFO][5055] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.514461 env[1221]: 2025-05-15 10:20:07.513 [INFO][5047] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761" May 15 10:20:07.515720 env[1221]: time="2025-05-15T10:20:07.515536349Z" level=info msg="TearDown network for sandbox \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\" successfully" May 15 10:20:07.518878 env[1221]: time="2025-05-15T10:20:07.518844832Z" level=info msg="RemovePodSandbox \"078a93f4af625f22a2135b15208475c58307c9b1be8c9f1c935b0add405b9761\" returns successfully" May 15 10:20:07.519502 env[1221]: time="2025-05-15T10:20:07.519470463Z" level=info msg="StopPodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\"" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.558 [WARNING][5077] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.558 [INFO][5077] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.558 [INFO][5077] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" iface="eth0" netns="" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.558 [INFO][5077] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.558 [INFO][5077] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.579 [INFO][5087] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.579 [INFO][5087] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.579 [INFO][5087] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.588 [WARNING][5087] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.588 [INFO][5087] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.590 [INFO][5087] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.592810 env[1221]: 2025-05-15 10:20:07.591 [INFO][5077] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:07.593376 env[1221]: time="2025-05-15T10:20:07.592836153Z" level=info msg="TearDown network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" successfully" May 15 10:20:07.593376 env[1221]: time="2025-05-15T10:20:07.592875235Z" level=info msg="StopPodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" returns successfully" May 15 10:20:07.593376 env[1221]: time="2025-05-15T10:20:07.593342218Z" level=info msg="RemovePodSandbox for \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\"" May 15 10:20:07.593448 env[1221]: time="2025-05-15T10:20:07.593374060Z" level=info msg="Forcibly stopping sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\"" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.627 [WARNING][5111] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" WorkloadEndpoint="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.627 [INFO][5111] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.627 [INFO][5111] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" iface="eth0" netns="" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.627 [INFO][5111] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.627 [INFO][5111] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.646 [INFO][5121] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.646 [INFO][5121] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.646 [INFO][5121] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.654 [WARNING][5121] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.654 [INFO][5121] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" HandleID="k8s-pod-network.16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" Workload="localhost-k8s-calico--apiserver--7d86bbcd9d--t2rkl-eth0" May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.656 [INFO][5121] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.658842 env[1221]: 2025-05-15 10:20:07.657 [INFO][5111] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c" May 15 10:20:07.659326 env[1221]: time="2025-05-15T10:20:07.659290983Z" level=info msg="TearDown network for sandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" successfully" May 15 10:20:07.662176 env[1221]: time="2025-05-15T10:20:07.662140843Z" level=info msg="RemovePodSandbox \"16256cabe700fdfe943cf401136866bc1736bbb993afa7b3e5e72ea3d6e61c6c\" returns successfully" May 15 10:20:07.662832 env[1221]: time="2025-05-15T10:20:07.662805476Z" level=info msg="StopPodSandbox for \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\"" May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.694 [WARNING][5143] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"f9568ad1-e01e-4fc3-9e6b-8060a82abcb8", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b", Pod:"coredns-668d6bf9bc-gfgp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3671b14ea21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.695 [INFO][5143] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.695 [INFO][5143] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" iface="eth0" netns="" May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.695 [INFO][5143] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.695 [INFO][5143] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.712 [INFO][5152] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.712 [INFO][5152] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.712 [INFO][5152] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.720 [WARNING][5152] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.720 [INFO][5152] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.722 [INFO][5152] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.725334 env[1221]: 2025-05-15 10:20:07.724 [INFO][5143] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:20:07.725773 env[1221]: time="2025-05-15T10:20:07.725344113Z" level=info msg="TearDown network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\" successfully" May 15 10:20:07.725773 env[1221]: time="2025-05-15T10:20:07.725374315Z" level=info msg="StopPodSandbox for \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\" returns successfully" May 15 10:20:07.726237 env[1221]: time="2025-05-15T10:20:07.726196435Z" level=info msg="RemovePodSandbox for \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\"" May 15 10:20:07.726294 env[1221]: time="2025-05-15T10:20:07.726240797Z" level=info msg="Forcibly stopping sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\"" May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.760 [WARNING][5175] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"f9568ad1-e01e-4fc3-9e6b-8060a82abcb8", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d6fb8fc1cdbc5992b526179a3210249f22e2c67a4e2072993ec24e1a175eed9b", Pod:"coredns-668d6bf9bc-gfgp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3671b14ea21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.760 [INFO][5175] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.760 [INFO][5175] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" iface="eth0" netns="" May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.760 [INFO][5175] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.760 [INFO][5175] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.779 [INFO][5184] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.779 [INFO][5184] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.779 [INFO][5184] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.787 [WARNING][5184] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.787 [INFO][5184] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" HandleID="k8s-pod-network.84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" Workload="localhost-k8s-coredns--668d6bf9bc--gfgp6-eth0" May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.789 [INFO][5184] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.792273 env[1221]: 2025-05-15 10:20:07.791 [INFO][5175] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e" May 15 10:20:07.793449 env[1221]: time="2025-05-15T10:20:07.792248725Z" level=info msg="TearDown network for sandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\" successfully" May 15 10:20:07.796312 env[1221]: time="2025-05-15T10:20:07.796284324Z" level=info msg="RemovePodSandbox \"84a8988e40957b73fc5edc4c36d28719c685d026e810d14e0c815dce0c06a64e\" returns successfully" May 15 10:20:07.796916 env[1221]: time="2025-05-15T10:20:07.796887433Z" level=info msg="StopPodSandbox for \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\"" May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.830 [WARNING][5207] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--76scb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3c40d6c0-7b50-499e-8d90-66ba3800bea7", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316", Pod:"csi-node-driver-76scb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8f143de75e2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.830 [INFO][5207] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.830 [INFO][5207] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" iface="eth0" netns="" May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.830 [INFO][5207] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.830 [INFO][5207] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.848 [INFO][5215] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.848 [INFO][5215] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.848 [INFO][5215] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.857 [WARNING][5215] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.857 [INFO][5215] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.858 [INFO][5215] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.861222 env[1221]: 2025-05-15 10:20:07.859 [INFO][5207] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:20:07.861657 env[1221]: time="2025-05-15T10:20:07.861253401Z" level=info msg="TearDown network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\" successfully" May 15 10:20:07.861657 env[1221]: time="2025-05-15T10:20:07.861282242Z" level=info msg="StopPodSandbox for \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\" returns successfully" May 15 10:20:07.861919 env[1221]: time="2025-05-15T10:20:07.861894232Z" level=info msg="RemovePodSandbox for \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\"" May 15 10:20:07.862063 env[1221]: time="2025-05-15T10:20:07.862024399Z" level=info msg="Forcibly stopping sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\"" May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.901 [WARNING][5237] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--76scb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3c40d6c0-7b50-499e-8d90-66ba3800bea7", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44912f3bf2a0988186b80cc41e1aa1eaee4ca99d7b6d2692ca77928ae976b316", Pod:"csi-node-driver-76scb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8f143de75e2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.901 [INFO][5237] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.902 [INFO][5237] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" iface="eth0" netns="" May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.902 [INFO][5237] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.902 [INFO][5237] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.920 [INFO][5245] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.920 [INFO][5245] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.920 [INFO][5245] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.929 [WARNING][5245] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.929 [INFO][5245] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" HandleID="k8s-pod-network.8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" Workload="localhost-k8s-csi--node--driver--76scb-eth0" May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.930 [INFO][5245] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:07.933333 env[1221]: 2025-05-15 10:20:07.932 [INFO][5237] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5" May 15 10:20:07.933741 env[1221]: time="2025-05-15T10:20:07.933368949Z" level=info msg="TearDown network for sandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\" successfully" May 15 10:20:07.936314 env[1221]: time="2025-05-15T10:20:07.936267612Z" level=info msg="RemovePodSandbox \"8c2d4a0d5f6f2bccd6449015d9ab2024b1d0aa9ee89f529f4277212def4adef5\" returns successfully" May 15 10:20:07.936815 env[1221]: time="2025-05-15T10:20:07.936788317Z" level=info msg="StopPodSandbox for \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\"" May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.969 [WARNING][5268] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0", GenerateName:"calico-kube-controllers-7f98dd9fcb-", Namespace:"calico-system", SelfLink:"", UID:"66389d50-bf1d-4173-a03c-8eca0974a0aa", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f98dd9fcb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051", Pod:"calico-kube-controllers-7f98dd9fcb-7tgjn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia68d11a7a35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.969 [INFO][5268] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.969 [INFO][5268] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" iface="eth0" netns="" May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.969 [INFO][5268] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.969 [INFO][5268] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.988 [INFO][5276] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.988 [INFO][5276] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.988 [INFO][5276] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.996 [WARNING][5276] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.996 [INFO][5276] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.998 [INFO][5276] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:08.000788 env[1221]: 2025-05-15 10:20:07.999 [INFO][5268] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:20:08.001401 env[1221]: time="2025-05-15T10:20:08.000818668Z" level=info msg="TearDown network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\" successfully" May 15 10:20:08.001401 env[1221]: time="2025-05-15T10:20:08.000848589Z" level=info msg="StopPodSandbox for \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\" returns successfully" May 15 10:20:08.001401 env[1221]: time="2025-05-15T10:20:08.001378495Z" level=info msg="RemovePodSandbox for \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\"" May 15 10:20:08.001467 env[1221]: time="2025-05-15T10:20:08.001411537Z" level=info msg="Forcibly stopping sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\"" May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.038 [WARNING][5299] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0", GenerateName:"calico-kube-controllers-7f98dd9fcb-", Namespace:"calico-system", SelfLink:"", UID:"66389d50-bf1d-4173-a03c-8eca0974a0aa", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f98dd9fcb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051", Pod:"calico-kube-controllers-7f98dd9fcb-7tgjn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia68d11a7a35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.038 [INFO][5299] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.038 [INFO][5299] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" iface="eth0" netns="" May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.038 [INFO][5299] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.038 [INFO][5299] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.057 [INFO][5307] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.057 [INFO][5307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.057 [INFO][5307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.066 [WARNING][5307] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.066 [INFO][5307] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" HandleID="k8s-pod-network.bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.067 [INFO][5307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:08.070118 env[1221]: 2025-05-15 10:20:08.068 [INFO][5299] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae" May 15 10:20:08.070118 env[1221]: time="2025-05-15T10:20:08.070076802Z" level=info msg="TearDown network for sandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\" successfully" May 15 10:20:08.073490 env[1221]: time="2025-05-15T10:20:08.073459327Z" level=info msg="RemovePodSandbox \"bf91dba37691eb7525d921013a27d5bc5f29c8b1d94e3d7d47b34daaea5f64ae\" returns successfully" May 15 10:20:08.074002 env[1221]: time="2025-05-15T10:20:08.073918989Z" level=info msg="StopPodSandbox for \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\"" May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.114 [WARNING][5331] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0", GenerateName:"calico-apiserver-78d645f96f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab7b7c44-1e90-4685-90d5-9a8c91357fbd", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78d645f96f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68", Pod:"calico-apiserver-78d645f96f-nfvxb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3af70340ddc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.114 [INFO][5331] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.114 [INFO][5331] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" iface="eth0" netns="" May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.114 [INFO][5331] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.114 [INFO][5331] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.132 [INFO][5339] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.132 [INFO][5339] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.132 [INFO][5339] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.141 [WARNING][5339] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.141 [INFO][5339] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.142 [INFO][5339] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:08.145137 env[1221]: 2025-05-15 10:20:08.143 [INFO][5331] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:20:08.145774 env[1221]: time="2025-05-15T10:20:08.145728047Z" level=info msg="TearDown network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\" successfully" May 15 10:20:08.145856 env[1221]: time="2025-05-15T10:20:08.145838533Z" level=info msg="StopPodSandbox for \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\" returns successfully" May 15 10:20:08.146405 env[1221]: time="2025-05-15T10:20:08.146357878Z" level=info msg="RemovePodSandbox for \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\"" May 15 10:20:08.146472 env[1221]: time="2025-05-15T10:20:08.146395080Z" level=info msg="Forcibly stopping sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\"" May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.187 [WARNING][5361] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0", GenerateName:"calico-apiserver-78d645f96f-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab7b7c44-1e90-4685-90d5-9a8c91357fbd", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78d645f96f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ef602e1a0486e555dc677f6a501e7edb8a0dad2dacacd55cac43fb4d80564b68", Pod:"calico-apiserver-78d645f96f-nfvxb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3af70340ddc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.188 [INFO][5361] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.189 [INFO][5361] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" iface="eth0" netns="" May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.190 [INFO][5361] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.190 [INFO][5361] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.209 [INFO][5369] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.209 [INFO][5369] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.209 [INFO][5369] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.218 [WARNING][5369] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.218 [INFO][5369] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" HandleID="k8s-pod-network.c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" Workload="localhost-k8s-calico--apiserver--78d645f96f--nfvxb-eth0" May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.219 [INFO][5369] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:08.222178 env[1221]: 2025-05-15 10:20:08.220 [INFO][5361] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf" May 15 10:20:08.222594 env[1221]: time="2025-05-15T10:20:08.222202653Z" level=info msg="TearDown network for sandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\" successfully" May 15 10:20:08.224807 env[1221]: time="2025-05-15T10:20:08.224776658Z" level=info msg="RemovePodSandbox \"c35f0c3926b3af5d41ac9cbc6a1171f8ff40a4311eaec2ed15b72de3f44222bf\" returns successfully" May 15 10:20:08.225267 env[1221]: time="2025-05-15T10:20:08.225235761Z" level=info msg="StopPodSandbox for \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\"" May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.258 [WARNING][5392] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"30eb1573-ab57-40ef-b9fa-ed1521a014a6", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e", Pod:"coredns-668d6bf9bc-tkzfl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali44a0348ad89", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.258 [INFO][5392] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.258 [INFO][5392] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" iface="eth0" netns="" May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.258 [INFO][5392] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.258 [INFO][5392] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.276 [INFO][5401] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.276 [INFO][5401] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.276 [INFO][5401] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.285 [WARNING][5401] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.285 [INFO][5401] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.286 [INFO][5401] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:08.289204 env[1221]: 2025-05-15 10:20:08.287 [INFO][5392] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:20:08.289735 env[1221]: time="2025-05-15T10:20:08.289683780Z" level=info msg="TearDown network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\" successfully" May 15 10:20:08.289808 env[1221]: time="2025-05-15T10:20:08.289791746Z" level=info msg="StopPodSandbox for \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\" returns successfully" May 15 10:20:08.290460 env[1221]: time="2025-05-15T10:20:08.290423296Z" level=info msg="RemovePodSandbox for \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\"" May 15 10:20:08.290527 env[1221]: time="2025-05-15T10:20:08.290458578Z" level=info msg="Forcibly stopping sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\"" May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.325 [WARNING][5423] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"30eb1573-ab57-40ef-b9fa-ed1521a014a6", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"121d482940e29508f1a1b3beccb697d6f222febd983ad0f8c589e19e4d1d197e", Pod:"coredns-668d6bf9bc-tkzfl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali44a0348ad89", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.325 [INFO][5423] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.326 [INFO][5423] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" iface="eth0" netns="" May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.326 [INFO][5423] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.326 [INFO][5423] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.343 [INFO][5431] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.343 [INFO][5431] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.343 [INFO][5431] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.353 [WARNING][5431] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.353 [INFO][5431] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" HandleID="k8s-pod-network.edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" Workload="localhost-k8s-coredns--668d6bf9bc--tkzfl-eth0" May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.354 [INFO][5431] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:08.361443 env[1221]: 2025-05-15 10:20:08.356 [INFO][5423] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef" May 15 10:20:08.361443 env[1221]: time="2025-05-15T10:20:08.361419915Z" level=info msg="TearDown network for sandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\" successfully" May 15 10:20:08.364111 env[1221]: time="2025-05-15T10:20:08.364071364Z" level=info msg="RemovePodSandbox \"edc3e66cc5436e3a1f19baed1164d776142371f07703ff2b24473f120a5136ef\" returns successfully" May 15 10:20:12.129906 systemd[1]: Started sshd@16-10.0.0.84:22-10.0.0.1:45686.service. May 15 10:20:12.134427 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:20:12.134489 kernel: audit: type=1130 audit(1747304412.129:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.84:22-10.0.0.1:45686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:12.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.84:22-10.0.0.1:45686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:12.145005 kernel: audit: type=1400 audit(1747304412.137:1476): avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:12.145099 kernel: audit: type=1300 audit(1747304412.137:1476): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001e41de0 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:12.145118 kernel: audit: type=1327 audit(1747304412.137:1476): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:12.137000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:12.137000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001e41de0 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:12.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:12.137000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:12.148711 kernel: audit: type=1400 audit(1747304412.137:1477): avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:12.148922 kernel: audit: type=1300 audit(1747304412.137:1477): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4003189880 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:12.137000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4003189880 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:12.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:12.154604 kernel: audit: type=1327 audit(1747304412.137:1477): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:12.154652 kernel: audit: type=1400 audit(1747304412.137:1478): avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:12.137000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:12.157047 kernel: audit: type=1300 audit(1747304412.137:1478): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001e7c780 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:12.137000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001e7c780 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:12.160117 kernel: audit: type=1327 audit(1747304412.137:1478): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:12.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:12.137000 audit[1849]: AVC avc: denied { watch } for pid=1849 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:20:12.137000 audit[1849]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001651780 a2=fc6 a3=0 items=0 ppid=1679 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c992 key=(null) May 15 10:20:12.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:20:12.172000 audit[5442]: USER_ACCT pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.174173 sshd[5442]: Accepted publickey for core from 10.0.0.1 port 45686 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:12.174000 audit[5442]: CRED_ACQ pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.174000 audit[5442]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0cb37e0 a2=3 a3=1 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:12.175898 sshd[5442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:12.180408 systemd[1]: Started session-17.scope. May 15 10:20:12.180724 systemd-logind[1207]: New session 17 of user core. May 15 10:20:12.183000 audit[5442]: USER_START pid=5442 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.184000 audit[5444]: CRED_ACQ pid=5444 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.290675 sshd[5442]: pam_unix(sshd:session): session closed for user core May 15 10:20:12.293000 audit[5442]: USER_END pid=5442 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.293000 audit[5442]: CRED_DISP pid=5442 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.294964 systemd[1]: Started sshd@17-10.0.0.84:22-10.0.0.1:45690.service. May 15 10:20:12.296247 systemd[1]: sshd@16-10.0.0.84:22-10.0.0.1:45686.service: Deactivated successfully. May 15 10:20:12.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.84:22-10.0.0.1:45690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:12.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.84:22-10.0.0.1:45686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:12.297130 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:20:12.298641 systemd-logind[1207]: Session 17 logged out. Waiting for processes to exit. May 15 10:20:12.299336 systemd-logind[1207]: Removed session 17. May 15 10:20:12.326000 audit[5455]: USER_ACCT pid=5455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.327510 sshd[5455]: Accepted publickey for core from 10.0.0.1 port 45690 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:12.327000 audit[5455]: CRED_ACQ pid=5455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.327000 audit[5455]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff45f60c0 a2=3 a3=1 items=0 ppid=1 pid=5455 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.327000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:12.328771 sshd[5455]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:12.333333 systemd[1]: Started session-18.scope. May 15 10:20:12.333832 systemd-logind[1207]: New session 18 of user core. May 15 10:20:12.337000 audit[5455]: USER_START pid=5455 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.338000 audit[5458]: CRED_ACQ pid=5458 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.544118 sshd[5455]: pam_unix(sshd:session): session closed for user core May 15 10:20:12.544000 audit[5455]: USER_END pid=5455 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.544000 audit[5455]: CRED_DISP pid=5455 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.548709 systemd[1]: Started sshd@18-10.0.0.84:22-10.0.0.1:59048.service. May 15 10:20:12.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.84:22-10.0.0.1:59048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:12.549513 systemd[1]: sshd@17-10.0.0.84:22-10.0.0.1:45690.service: Deactivated successfully. May 15 10:20:12.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.84:22-10.0.0.1:45690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:12.550258 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:20:12.550803 systemd-logind[1207]: Session 18 logged out. Waiting for processes to exit. May 15 10:20:12.551696 systemd-logind[1207]: Removed session 18. May 15 10:20:12.585000 audit[5467]: USER_ACCT pid=5467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.586780 sshd[5467]: Accepted publickey for core from 10.0.0.1 port 59048 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:12.586000 audit[5467]: CRED_ACQ pid=5467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.586000 audit[5467]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeca5c070 a2=3 a3=1 items=0 ppid=1 pid=5467 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:12.588089 sshd[5467]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:12.598187 systemd-logind[1207]: New session 19 of user core. May 15 10:20:12.599059 systemd[1]: Started session-19.scope. May 15 10:20:12.604000 audit[5467]: USER_START pid=5467 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.605000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:12.913000 audit[5479]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:12.913000 audit[5479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff748fba0 a2=0 a3=1 items=0 ppid=2108 pid=5479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:12.927000 audit[5479]: NETFILTER_CFG table=nat:125 family=2 entries=36 op=nft_register_rule pid=5479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:12.927000 audit[5479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff748fba0 a2=0 a3=1 items=0 ppid=2108 pid=5479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:13.274008 sshd[5467]: pam_unix(sshd:session): session closed for user core May 15 10:20:13.274000 audit[5467]: USER_END pid=5467 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.274000 audit[5467]: CRED_DISP pid=5467 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.278146 systemd[1]: Started sshd@19-10.0.0.84:22-10.0.0.1:59062.service. May 15 10:20:13.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.84:22-10.0.0.1:59062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:13.272000 audit[5486]: NETFILTER_CFG table=filter:126 family=2 entries=8 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:13.272000 audit[5486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe6570540 a2=0 a3=1 items=0 ppid=2108 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:13.280059 systemd-logind[1207]: Session 19 logged out. Waiting for processes to exit. May 15 10:20:13.280323 systemd[1]: sshd@18-10.0.0.84:22-10.0.0.1:59048.service: Deactivated successfully. May 15 10:20:13.281032 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:20:13.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.84:22-10.0.0.1:59048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:13.281834 systemd-logind[1207]: Removed session 19. May 15 10:20:13.285000 audit[5486]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:13.285000 audit[5486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe6570540 a2=0 a3=1 items=0 ppid=2108 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:13.317000 audit[5488]: USER_ACCT pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.318359 sshd[5488]: Accepted publickey for core from 10.0.0.1 port 59062 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:13.318000 audit[5488]: CRED_ACQ pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.318000 audit[5488]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3392750 a2=3 a3=1 items=0 ppid=1 pid=5488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:13.319630 sshd[5488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:13.323144 systemd-logind[1207]: New session 20 of user core. May 15 10:20:13.323948 systemd[1]: Started session-20.scope. May 15 10:20:13.327000 audit[5488]: USER_START pid=5488 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.328000 audit[5491]: CRED_ACQ pid=5491 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.618838 sshd[5488]: pam_unix(sshd:session): session closed for user core May 15 10:20:13.622161 systemd[1]: Started sshd@20-10.0.0.84:22-10.0.0.1:59066.service. May 15 10:20:13.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.84:22-10.0.0.1:59066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:13.623000 audit[5488]: USER_END pid=5488 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.624000 audit[5488]: CRED_DISP pid=5488 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.632440 systemd-logind[1207]: Session 20 logged out. Waiting for processes to exit. May 15 10:20:13.632674 systemd[1]: sshd@19-10.0.0.84:22-10.0.0.1:59062.service: Deactivated successfully. May 15 10:20:13.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.84:22-10.0.0.1:59062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:13.633547 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:20:13.634567 systemd-logind[1207]: Removed session 20. May 15 10:20:13.659000 audit[5499]: USER_ACCT pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.660324 sshd[5499]: Accepted publickey for core from 10.0.0.1 port 59066 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:13.660000 audit[5499]: CRED_ACQ pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.660000 audit[5499]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd61848c0 a2=3 a3=1 items=0 ppid=1 pid=5499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.660000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:13.662170 sshd[5499]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:13.665440 systemd-logind[1207]: New session 21 of user core. May 15 10:20:13.666520 systemd[1]: Started session-21.scope. May 15 10:20:13.669000 audit[5499]: USER_START pid=5499 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.670000 audit[5502]: CRED_ACQ pid=5502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.800058 sshd[5499]: pam_unix(sshd:session): session closed for user core May 15 10:20:13.799000 audit[5499]: USER_END pid=5499 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.800000 audit[5499]: CRED_DISP pid=5499 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:13.802526 systemd[1]: sshd@20-10.0.0.84:22-10.0.0.1:59066.service: Deactivated successfully. May 15 10:20:13.803295 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:20:13.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.84:22-10.0.0.1:59066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:13.803776 systemd-logind[1207]: Session 21 logged out. Waiting for processes to exit. May 15 10:20:13.804388 systemd-logind[1207]: Removed session 21. May 15 10:20:14.300000 audit[5513]: NETFILTER_CFG table=filter:128 family=2 entries=20 op=nft_register_rule pid=5513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:14.300000 audit[5513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffcb0fecd0 a2=0 a3=1 items=0 ppid=2108 pid=5513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:14.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:14.308000 audit[5513]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=5513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:14.308000 audit[5513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffcb0fecd0 a2=0 a3=1 items=0 ppid=2108 pid=5513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:14.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:16.191862 kubelet[1959]: E0515 10:20:16.191816 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:16.192401 kubelet[1959]: E0515 10:20:16.192377 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:17.928000 audit[5526]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:17.931131 kernel: kauditd_printk_skb: 75 callbacks suppressed May 15 10:20:17.931210 kernel: audit: type=1325 audit(1747304417.928:1530): table=filter:130 family=2 entries=20 op=nft_register_rule pid=5526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:17.931239 kernel: audit: type=1300 audit(1747304417.928:1530): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe23e2de0 a2=0 a3=1 items=0 ppid=2108 pid=5526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.928000 audit[5526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe23e2de0 a2=0 a3=1 items=0 ppid=2108 pid=5526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.928000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:17.935564 kernel: audit: type=1327 audit(1747304417.928:1530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:17.942000 audit[5526]: NETFILTER_CFG table=nat:131 family=2 entries=106 op=nft_register_chain pid=5526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:17.942000 audit[5526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe23e2de0 a2=0 a3=1 items=0 ppid=2108 pid=5526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.948979 kernel: audit: type=1325 audit(1747304417.942:1531): table=nat:131 family=2 entries=106 op=nft_register_chain pid=5526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:17.949046 kernel: audit: type=1300 audit(1747304417.942:1531): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe23e2de0 a2=0 a3=1 items=0 ppid=2108 pid=5526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.949072 kernel: audit: type=1327 audit(1747304417.942:1531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:17.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:18.804590 systemd[1]: Started sshd@21-10.0.0.84:22-10.0.0.1:59080.service. May 15 10:20:18.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.84:22-10.0.0.1:59080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:18.807996 kernel: audit: type=1130 audit(1747304418.803:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.84:22-10.0.0.1:59080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:18.835000 audit[5528]: USER_ACCT pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:18.836474 sshd[5528]: Accepted publickey for core from 10.0.0.1 port 59080 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:18.837591 sshd[5528]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:18.836000 audit[5528]: CRED_ACQ pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:18.841530 kernel: audit: type=1101 audit(1747304418.835:1533): pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:18.841591 kernel: audit: type=1103 audit(1747304418.836:1534): pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:18.843088 kernel: audit: type=1006 audit(1747304418.836:1535): pid=5528 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 10:20:18.836000 audit[5528]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd05e9cf0 a2=3 a3=1 items=0 ppid=1 pid=5528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:18.836000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:18.844354 systemd-logind[1207]: New session 22 of user core. May 15 10:20:18.845195 systemd[1]: Started session-22.scope. May 15 10:20:18.847000 audit[5528]: USER_START pid=5528 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:18.848000 audit[5530]: CRED_ACQ pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:18.954070 sshd[5528]: pam_unix(sshd:session): session closed for user core May 15 10:20:18.953000 audit[5528]: USER_END pid=5528 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:18.954000 audit[5528]: CRED_DISP pid=5528 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:18.956896 systemd[1]: sshd@21-10.0.0.84:22-10.0.0.1:59080.service: Deactivated successfully. May 15 10:20:18.957696 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:20:18.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.84:22-10.0.0.1:59080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:18.958232 systemd-logind[1207]: Session 22 logged out. Waiting for processes to exit. May 15 10:20:18.958983 systemd-logind[1207]: Removed session 22. May 15 10:20:19.096415 systemd[1]: run-containerd-runc-k8s.io-57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33-runc.lpvsKV.mount: Deactivated successfully. May 15 10:20:21.695961 env[1221]: time="2025-05-15T10:20:21.695910030Z" level=info msg="StopContainer for \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\" with timeout 300 (s)" May 15 10:20:21.696511 env[1221]: time="2025-05-15T10:20:21.696308584Z" level=info msg="Stop container \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\" with signal terminated" May 15 10:20:21.729000 audit[5585]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:21.729000 audit[5585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc2e0b010 a2=0 a3=1 items=0 ppid=2108 pid=5585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:21.735000 audit[5585]: NETFILTER_CFG table=nat:133 family=2 entries=54 op=nft_register_rule pid=5585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:21.735000 audit[5585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffc2e0b010 a2=0 a3=1 items=0 ppid=2108 pid=5585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:21.752000 audit[5587]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:21.752000 audit[5587]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffeabcd780 a2=0 a3=1 items=0 ppid=2108 pid=5587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:21.758000 audit[5587]: NETFILTER_CFG table=nat:135 family=2 entries=46 op=nft_register_rule pid=5587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:21.758000 audit[5587]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=15756 a0=3 a1=ffffeabcd780 a2=0 a3=1 items=0 ppid=2108 pid=5587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:21.782178 env[1221]: time="2025-05-15T10:20:21.782132602Z" level=info msg="StopContainer for \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\" with timeout 30 (s)" May 15 10:20:21.782685 env[1221]: time="2025-05-15T10:20:21.782652834Z" level=info msg="Stop container \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\" with signal terminated" May 15 10:20:21.793641 systemd[1]: cri-containerd-57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33.scope: Deactivated successfully. May 15 10:20:21.792000 audit: BPF prog-id=209 op=UNLOAD May 15 10:20:21.797000 audit: BPF prog-id=212 op=UNLOAD May 15 10:20:21.814966 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33-rootfs.mount: Deactivated successfully. May 15 10:20:21.828341 env[1221]: time="2025-05-15T10:20:21.828293883Z" level=info msg="shim disconnected" id=57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33 May 15 10:20:21.828533 env[1221]: time="2025-05-15T10:20:21.828345842Z" level=warning msg="cleaning up after shim disconnected" id=57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33 namespace=k8s.io May 15 10:20:21.828533 env[1221]: time="2025-05-15T10:20:21.828356842Z" level=info msg="cleaning up dead shim" May 15 10:20:21.835670 env[1221]: time="2025-05-15T10:20:21.835628375Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5606 runtime=io.containerd.runc.v2\n" May 15 10:20:21.837637 env[1221]: time="2025-05-15T10:20:21.837595466Z" level=info msg="StopContainer for \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\" returns successfully" May 15 10:20:21.838116 env[1221]: time="2025-05-15T10:20:21.838084619Z" level=info msg="StopPodSandbox for \"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051\"" May 15 10:20:21.838289 env[1221]: time="2025-05-15T10:20:21.838263977Z" level=info msg="Container to stop \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:20:21.840774 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051-shm.mount: Deactivated successfully. May 15 10:20:21.846359 systemd[1]: cri-containerd-6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051.scope: Deactivated successfully. May 15 10:20:21.845000 audit: BPF prog-id=174 op=UNLOAD May 15 10:20:21.850000 audit: BPF prog-id=177 op=UNLOAD May 15 10:20:21.862037 env[1221]: time="2025-05-15T10:20:21.861965748Z" level=info msg="shim disconnected" id=6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051 May 15 10:20:21.862241 env[1221]: time="2025-05-15T10:20:21.862219944Z" level=warning msg="cleaning up after shim disconnected" id=6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051 namespace=k8s.io May 15 10:20:21.862372 env[1221]: time="2025-05-15T10:20:21.862356502Z" level=info msg="cleaning up dead shim" May 15 10:20:21.863946 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051-rootfs.mount: Deactivated successfully. May 15 10:20:21.869534 env[1221]: time="2025-05-15T10:20:21.869501677Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5636 runtime=io.containerd.runc.v2\n" May 15 10:20:21.921913 systemd-networkd[1047]: calia68d11a7a35: Link DOWN May 15 10:20:21.921920 systemd-networkd[1047]: calia68d11a7a35: Lost carrier May 15 10:20:21.937000 audit[5677]: NETFILTER_CFG table=filter:136 family=2 entries=42 op=nft_register_rule pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:21.937000 audit[5677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6704 a0=3 a1=ffffd397ac10 a2=0 a3=ffffb4551fa8 items=0 ppid=3299 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.937000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:21.937000 audit[5677]: NETFILTER_CFG table=filter:137 family=2 entries=4 op=nft_unregister_chain pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:21.937000 audit[5677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=592 a0=3 a1=ffffd397ac10 a2=0 a3=ffffb4551fa8 items=0 ppid=3299 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.937000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.920 [INFO][5664] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.921 [INFO][5664] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" iface="eth0" netns="/var/run/netns/cni-0475d206-3752-9b10-81ec-3e354ce8e9d7" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.921 [INFO][5664] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" iface="eth0" netns="/var/run/netns/cni-0475d206-3752-9b10-81ec-3e354ce8e9d7" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.936 [INFO][5664] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" after=15.186656ms iface="eth0" netns="/var/run/netns/cni-0475d206-3752-9b10-81ec-3e354ce8e9d7" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.936 [INFO][5664] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.936 [INFO][5664] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.956 [INFO][5679] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" HandleID="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.956 [INFO][5679] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:21.956 [INFO][5679] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:22.034 [INFO][5679] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" HandleID="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:22.034 [INFO][5679] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" HandleID="k8s-pod-network.6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" Workload="localhost-k8s-calico--kube--controllers--7f98dd9fcb--7tgjn-eth0" May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:22.037 [INFO][5679] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:22.040136 env[1221]: 2025-05-15 10:20:22.038 [INFO][5664] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051" May 15 10:20:22.040854 env[1221]: time="2025-05-15T10:20:22.040817819Z" level=info msg="TearDown network for sandbox \"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051\" successfully" May 15 10:20:22.040952 env[1221]: time="2025-05-15T10:20:22.040933857Z" level=info msg="StopPodSandbox for \"6b41a709b96890964b9042907582cdd9bd0d6fbc30e8733fd608102fd5b6d051\" returns successfully" May 15 10:20:22.043149 systemd[1]: run-netns-cni\x2d0475d206\x2d3752\x2d9b10\x2d81ec\x2d3e354ce8e9d7.mount: Deactivated successfully. May 15 10:20:22.116841 kubelet[1959]: I0515 10:20:22.116797 1959 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/66389d50-bf1d-4173-a03c-8eca0974a0aa-tigera-ca-bundle\") pod \"66389d50-bf1d-4173-a03c-8eca0974a0aa\" (UID: \"66389d50-bf1d-4173-a03c-8eca0974a0aa\") " May 15 10:20:22.116841 kubelet[1959]: I0515 10:20:22.116843 1959 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-28bqq\" (UniqueName: \"kubernetes.io/projected/66389d50-bf1d-4173-a03c-8eca0974a0aa-kube-api-access-28bqq\") pod \"66389d50-bf1d-4173-a03c-8eca0974a0aa\" (UID: \"66389d50-bf1d-4173-a03c-8eca0974a0aa\") " May 15 10:20:22.122436 systemd[1]: var-lib-kubelet-pods-66389d50\x2dbf1d\x2d4173\x2da03c\x2d8eca0974a0aa-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d28bqq.mount: Deactivated successfully. May 15 10:20:22.122939 kubelet[1959]: I0515 10:20:22.122896 1959 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/66389d50-bf1d-4173-a03c-8eca0974a0aa-kube-api-access-28bqq" (OuterVolumeSpecName: "kube-api-access-28bqq") pod "66389d50-bf1d-4173-a03c-8eca0974a0aa" (UID: "66389d50-bf1d-4173-a03c-8eca0974a0aa"). InnerVolumeSpecName "kube-api-access-28bqq". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 15 10:20:22.124510 kubelet[1959]: I0515 10:20:22.124458 1959 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/66389d50-bf1d-4173-a03c-8eca0974a0aa-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "66389d50-bf1d-4173-a03c-8eca0974a0aa" (UID: "66389d50-bf1d-4173-a03c-8eca0974a0aa"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 15 10:20:22.217153 kubelet[1959]: I0515 10:20:22.217107 1959 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/66389d50-bf1d-4173-a03c-8eca0974a0aa-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 15 10:20:22.217153 kubelet[1959]: I0515 10:20:22.217145 1959 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-28bqq\" (UniqueName: \"kubernetes.io/projected/66389d50-bf1d-4173-a03c-8eca0974a0aa-kube-api-access-28bqq\") on node \"localhost\" DevicePath \"\"" May 15 10:20:22.448638 kubelet[1959]: I0515 10:20:22.448530 1959 scope.go:117] "RemoveContainer" containerID="57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33" May 15 10:20:22.451018 env[1221]: time="2025-05-15T10:20:22.450961970Z" level=info msg="RemoveContainer for \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\"" May 15 10:20:22.453025 systemd[1]: Removed slice kubepods-besteffort-pod66389d50_bf1d_4173_a03c_8eca0974a0aa.slice. May 15 10:20:22.455035 env[1221]: time="2025-05-15T10:20:22.454989317Z" level=info msg="RemoveContainer for \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\" returns successfully" May 15 10:20:22.455421 kubelet[1959]: I0515 10:20:22.455395 1959 scope.go:117] "RemoveContainer" containerID="57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33" May 15 10:20:22.455697 env[1221]: time="2025-05-15T10:20:22.455632949Z" level=error msg="ContainerStatus for \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\": not found" May 15 10:20:22.455811 kubelet[1959]: E0515 10:20:22.455786 1959 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\": not found" containerID="57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33" May 15 10:20:22.455856 kubelet[1959]: I0515 10:20:22.455815 1959 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33"} err="failed to get container status \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\": rpc error: code = NotFound desc = an error occurred when try to find container \"57c70631cd834170cb0af6995b81bc71599adc8966079a8c9790c460114fae33\": not found" May 15 10:20:22.481412 kubelet[1959]: I0515 10:20:22.481364 1959 memory_manager.go:355] "RemoveStaleState removing state" podUID="66389d50-bf1d-4173-a03c-8eca0974a0aa" containerName="calico-kube-controllers" May 15 10:20:22.481412 kubelet[1959]: I0515 10:20:22.481395 1959 memory_manager.go:355] "RemoveStaleState removing state" podUID="9b12bc62-9412-4685-b095-bcca74cee564" containerName="calico-apiserver" May 15 10:20:22.486685 systemd[1]: Created slice kubepods-besteffort-pod1549e250_cec8_4294_9a2d_1b8fbec4297c.slice. May 15 10:20:22.519698 kubelet[1959]: I0515 10:20:22.519660 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1549e250-cec8-4294-9a2d-1b8fbec4297c-tigera-ca-bundle\") pod \"calico-kube-controllers-6946697459-p4xv2\" (UID: \"1549e250-cec8-4294-9a2d-1b8fbec4297c\") " pod="calico-system/calico-kube-controllers-6946697459-p4xv2" May 15 10:20:22.519698 kubelet[1959]: I0515 10:20:22.519698 1959 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s7pr5\" (UniqueName: \"kubernetes.io/projected/1549e250-cec8-4294-9a2d-1b8fbec4297c-kube-api-access-s7pr5\") pod \"calico-kube-controllers-6946697459-p4xv2\" (UID: \"1549e250-cec8-4294-9a2d-1b8fbec4297c\") " pod="calico-system/calico-kube-controllers-6946697459-p4xv2" May 15 10:20:22.789789 env[1221]: time="2025-05-15T10:20:22.789741223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6946697459-p4xv2,Uid:1549e250-cec8-4294-9a2d-1b8fbec4297c,Namespace:calico-system,Attempt:0,}" May 15 10:20:22.816729 systemd[1]: var-lib-kubelet-pods-66389d50\x2dbf1d\x2d4173\x2da03c\x2d8eca0974a0aa-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. May 15 10:20:22.911467 systemd-networkd[1047]: cali50cd97d0bc1: Link UP May 15 10:20:22.919758 systemd-networkd[1047]: cali50cd97d0bc1: Gained carrier May 15 10:20:22.920908 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali50cd97d0bc1: link becomes ready May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.830 [INFO][5691] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0 calico-kube-controllers-6946697459- calico-system 1549e250-cec8-4294-9a2d-1b8fbec4297c 1336 0 2025-05-15 10:20:22 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6946697459 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6946697459-p4xv2 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali50cd97d0bc1 [] []}} ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Namespace="calico-system" Pod="calico-kube-controllers-6946697459-p4xv2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.830 [INFO][5691] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Namespace="calico-system" Pod="calico-kube-controllers-6946697459-p4xv2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.863 [INFO][5704] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" HandleID="k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Workload="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.876 [INFO][5704] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" HandleID="k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Workload="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000369900), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6946697459-p4xv2", "timestamp":"2025-05-15 10:20:22.863722527 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.876 [INFO][5704] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.876 [INFO][5704] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.876 [INFO][5704] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.878 [INFO][5704] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.885 [INFO][5704] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.892 [INFO][5704] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.893 [INFO][5704] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.895 [INFO][5704] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.895 [INFO][5704] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.897 [INFO][5704] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.900 [INFO][5704] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.905 [INFO][5704] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.905 [INFO][5704] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" host="localhost" May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.905 [INFO][5704] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:22.940445 env[1221]: 2025-05-15 10:20:22.905 [INFO][5704] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" HandleID="k8s-pod-network.b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Workload="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" May 15 10:20:22.941459 env[1221]: 2025-05-15 10:20:22.907 [INFO][5691] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Namespace="calico-system" Pod="calico-kube-controllers-6946697459-p4xv2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0", GenerateName:"calico-kube-controllers-6946697459-", Namespace:"calico-system", SelfLink:"", UID:"1549e250-cec8-4294-9a2d-1b8fbec4297c", ResourceVersion:"1336", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 20, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6946697459", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6946697459-p4xv2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali50cd97d0bc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:22.941459 env[1221]: 2025-05-15 10:20:22.907 [INFO][5691] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.136/32] ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Namespace="calico-system" Pod="calico-kube-controllers-6946697459-p4xv2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" May 15 10:20:22.941459 env[1221]: 2025-05-15 10:20:22.907 [INFO][5691] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali50cd97d0bc1 ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Namespace="calico-system" Pod="calico-kube-controllers-6946697459-p4xv2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" May 15 10:20:22.941459 env[1221]: 2025-05-15 10:20:22.924 [INFO][5691] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Namespace="calico-system" Pod="calico-kube-controllers-6946697459-p4xv2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" May 15 10:20:22.941459 env[1221]: 2025-05-15 10:20:22.929 [INFO][5691] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Namespace="calico-system" Pod="calico-kube-controllers-6946697459-p4xv2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0", GenerateName:"calico-kube-controllers-6946697459-", Namespace:"calico-system", SelfLink:"", UID:"1549e250-cec8-4294-9a2d-1b8fbec4297c", ResourceVersion:"1336", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 20, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6946697459", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb", Pod:"calico-kube-controllers-6946697459-p4xv2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali50cd97d0bc1", MAC:"ea:be:55:82:e1:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:22.941459 env[1221]: 2025-05-15 10:20:22.938 [INFO][5691] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb" Namespace="calico-system" Pod="calico-kube-controllers-6946697459-p4xv2" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6946697459--p4xv2-eth0" May 15 10:20:22.956750 env[1221]: time="2025-05-15T10:20:22.956678861Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:20:22.956935 env[1221]: time="2025-05-15T10:20:22.956723101Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:20:22.956935 env[1221]: time="2025-05-15T10:20:22.956733900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:20:22.956935 env[1221]: time="2025-05-15T10:20:22.956872099Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb pid=5731 runtime=io.containerd.runc.v2 May 15 10:20:22.974251 systemd[1]: run-containerd-runc-k8s.io-b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb-runc.kepaAn.mount: Deactivated successfully. May 15 10:20:22.976903 systemd[1]: Started cri-containerd-b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb.scope. May 15 10:20:22.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.999472 kernel: kauditd_printk_skb: 29 callbacks suppressed May 15 10:20:22.999526 kernel: audit: type=1400 audit(1747304422.997:1551): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.003236 kernel: audit: type=1400 audit(1747304422.997:1552): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.003292 kernel: audit: type=1400 audit(1747304422.997:1553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.005151 kernel: audit: type=1400 audit(1747304422.997:1554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.007127 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:20:22.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.009189 kernel: audit: type=1400 audit(1747304422.997:1555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.009264 kernel: audit: type=1400 audit(1747304422.997:1556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.011190 kernel: audit: type=1400 audit(1747304422.997:1557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.013041 kernel: audit: type=1400 audit(1747304422.997:1558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.015057 kernel: audit: type=1400 audit(1747304422.997:1559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.018806 kernel: audit: type=1400 audit(1747304422.997:1560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit: BPF prog-id=216 op=LOAD May 15 10:20:22.997000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5731 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396235653137636335343338336636346166343566316435383538 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5731 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396235653137636335343338336636346166343566316435383538 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.997000 audit: BPF prog-id=217 op=LOAD May 15 10:20:22.997000 audit[5741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5731 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396235653137636335343338336636346166343566316435383538 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.998000 audit: BPF prog-id=218 op=LOAD May 15 10:20:22.998000 audit[5741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5731 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396235653137636335343338336636346166343566316435383538 May 15 10:20:23.000000 audit: BPF prog-id=218 op=UNLOAD May 15 10:20:23.000000 audit: BPF prog-id=217 op=UNLOAD May 15 10:20:23.000000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { perfmon } for pid=5741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit[5741]: AVC avc: denied { bpf } for pid=5741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.000000 audit: BPF prog-id=219 op=LOAD May 15 10:20:23.000000 audit[5741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5731 pid=5741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396235653137636335343338336636346166343566316435383538 May 15 10:20:23.027317 env[1221]: time="2025-05-15T10:20:23.027238369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6946697459-p4xv2,Uid:1549e250-cec8-4294-9a2d-1b8fbec4297c,Namespace:calico-system,Attempt:0,} returns sandbox id \"b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb\"" May 15 10:20:23.041509 env[1221]: time="2025-05-15T10:20:23.039764942Z" level=info msg="CreateContainer within sandbox \"b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:20:23.051674 env[1221]: time="2025-05-15T10:20:23.051614644Z" level=info msg="CreateContainer within sandbox \"b49b5e17cc54383f64af45f1d585871a4d2c3dcff2825c521f8a1f2b6f30dedb\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7a9ed494d318d65dfa7ea250e2debb5c7ec9a9a638d12232b7a5e1e1b7e92584\"" May 15 10:20:23.052397 env[1221]: time="2025-05-15T10:20:23.052362435Z" level=info msg="StartContainer for \"7a9ed494d318d65dfa7ea250e2debb5c7ec9a9a638d12232b7a5e1e1b7e92584\"" May 15 10:20:23.069134 systemd[1]: Started cri-containerd-7a9ed494d318d65dfa7ea250e2debb5c7ec9a9a638d12232b7a5e1e1b7e92584.scope. May 15 10:20:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.097000 audit: BPF prog-id=220 op=LOAD May 15 10:20:23.098000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.098000 audit[5771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5731 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396564343934643331386436356466613765613235306532646562 May 15 10:20:23.098000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.098000 audit[5771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5731 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396564343934643331386436356466613765613235306532646562 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.099000 audit: BPF prog-id=221 op=LOAD May 15 10:20:23.099000 audit[5771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5731 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396564343934643331386436356466613765613235306532646562 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit: BPF prog-id=222 op=LOAD May 15 10:20:23.100000 audit[5771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5731 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396564343934643331386436356466613765613235306532646562 May 15 10:20:23.100000 audit: BPF prog-id=222 op=UNLOAD May 15 10:20:23.100000 audit: BPF prog-id=221 op=UNLOAD May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { perfmon } for pid=5771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit[5771]: AVC avc: denied { bpf } for pid=5771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.100000 audit: BPF prog-id=223 op=LOAD May 15 10:20:23.100000 audit[5771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5731 pid=5771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396564343934643331386436356466613765613235306532646562 May 15 10:20:23.129113 env[1221]: time="2025-05-15T10:20:23.129053936Z" level=info msg="StartContainer for \"7a9ed494d318d65dfa7ea250e2debb5c7ec9a9a638d12232b7a5e1e1b7e92584\" returns successfully" May 15 10:20:23.195105 kubelet[1959]: I0515 10:20:23.194774 1959 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="66389d50-bf1d-4173-a03c-8eca0974a0aa" path="/var/lib/kubelet/pods/66389d50-bf1d-4173-a03c-8eca0974a0aa/volumes" May 15 10:20:23.959820 systemd[1]: Started sshd@22-10.0.0.84:22-10.0.0.1:37812.service. May 15 10:20:23.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.84:22-10.0.0.1:37812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:23.995000 audit[5827]: USER_ACCT pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:23.996224 sshd[5827]: Accepted publickey for core from 10.0.0.1 port 37812 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:23.996000 audit[5827]: CRED_ACQ pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:23.996000 audit[5827]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8349c10 a2=3 a3=1 items=0 ppid=1 pid=5827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.996000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:23.997542 sshd[5827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:24.001000 systemd-logind[1207]: New session 23 of user core. May 15 10:20:24.001885 systemd[1]: Started session-23.scope. May 15 10:20:24.004000 audit[5827]: USER_START pid=5827 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:24.005000 audit[5829]: CRED_ACQ pid=5829 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:24.083081 systemd-networkd[1047]: cali50cd97d0bc1: Gained IPv6LL May 15 10:20:24.188109 sshd[5827]: pam_unix(sshd:session): session closed for user core May 15 10:20:24.188000 audit[5827]: USER_END pid=5827 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:24.188000 audit[5827]: CRED_DISP pid=5827 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:24.190465 systemd[1]: sshd@22-10.0.0.84:22-10.0.0.1:37812.service: Deactivated successfully. May 15 10:20:24.191254 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:20:24.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.84:22-10.0.0.1:37812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:24.191777 systemd-logind[1207]: Session 23 logged out. Waiting for processes to exit. May 15 10:20:24.192575 systemd-logind[1207]: Removed session 23. May 15 10:20:24.976000 audit[5886]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=5886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:24.976000 audit[5886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe52fa440 a2=0 a3=1 items=0 ppid=2108 pid=5886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:24.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:24.987000 audit[5886]: NETFILTER_CFG table=nat:139 family=2 entries=56 op=nft_register_chain pid=5886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:24.987000 audit[5886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18692 a0=3 a1=ffffe52fa440 a2=0 a3=1 items=0 ppid=2108 pid=5886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:24.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:25.486831 systemd[1]: run-containerd-runc-k8s.io-7a9ed494d318d65dfa7ea250e2debb5c7ec9a9a638d12232b7a5e1e1b7e92584-runc.U0H9NC.mount: Deactivated successfully. May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit: BPF prog-id=224 op=LOAD May 15 10:20:25.901000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdc08a9f8 a2=98 a3=ffffdc08a9e8 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.901000 audit: BPF prog-id=224 op=UNLOAD May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit: BPF prog-id=225 op=LOAD May 15 10:20:25.901000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc08a688 a2=74 a3=95 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.901000 audit: BPF prog-id=225 op=UNLOAD May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.901000 audit: BPF prog-id=226 op=LOAD May 15 10:20:25.901000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc08a6e8 a2=94 a3=2 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.901000 audit: BPF prog-id=226 op=UNLOAD May 15 10:20:25.986000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.986000 audit: BPF prog-id=227 op=LOAD May 15 10:20:25.986000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc08a6a8 a2=40 a3=ffffdc08a6d8 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.986000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.987000 audit: BPF prog-id=227 op=UNLOAD May 15 10:20:25.987000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.987000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdc08a7c0 a2=50 a3=0 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.987000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc08a718 a2=28 a3=ffffdc08a848 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc08a748 a2=28 a3=ffffdc08a878 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc08a5f8 a2=28 a3=ffffdc08a728 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc08a768 a2=28 a3=ffffdc08a898 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc08a748 a2=28 a3=ffffdc08a878 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc08a738 a2=28 a3=ffffdc08a868 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc08a768 a2=28 a3=ffffdc08a898 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc08a748 a2=28 a3=ffffdc08a878 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc08a768 a2=28 a3=ffffdc08a898 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc08a738 a2=28 a3=ffffdc08a868 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc08a7b8 a2=28 a3=ffffdc08a8f8 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc08a4f0 a2=50 a3=0 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.995000 audit: BPF prog-id=228 op=LOAD May 15 10:20:25.995000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc08a4f8 a2=94 a3=5 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.995000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.996000 audit: BPF prog-id=228 op=UNLOAD May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc08a600 a2=50 a3=0 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.996000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdc08a748 a2=4 a3=3 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.996000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { confidentiality } for pid=5947 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.996000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc08a728 a2=94 a3=6 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.996000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { confidentiality } for pid=5947 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.996000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc089ef8 a2=94 a3=83 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.996000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { perfmon } for pid=5947 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { bpf } for pid=5947 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.996000 audit[5947]: AVC avc: denied { confidentiality } for pid=5947 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.996000 audit[5947]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc089ef8 a2=94 a3=83 items=0 ppid=5928 pid=5947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.996000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit: BPF prog-id=229 op=LOAD May 15 10:20:25.998000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff615fbe8 a2=98 a3=fffff615fbd8 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.998000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:25.998000 audit: BPF prog-id=229 op=UNLOAD May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit: BPF prog-id=230 op=LOAD May 15 10:20:25.998000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff615f878 a2=74 a3=95 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.998000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:25.998000 audit: BPF prog-id=230 op=UNLOAD May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.998000 audit: BPF prog-id=231 op=LOAD May 15 10:20:25.998000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff615f8d8 a2=94 a3=2 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.998000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:25.998000 audit: BPF prog-id=231 op=UNLOAD May 15 10:20:26.050186 systemd[1]: cri-containerd-58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e.scope: Deactivated successfully. May 15 10:20:26.049000 audit: BPF prog-id=126 op=UNLOAD May 15 10:20:26.054000 audit: BPF prog-id=129 op=UNLOAD May 15 10:20:26.074745 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e-rootfs.mount: Deactivated successfully. May 15 10:20:26.075978 env[1221]: time="2025-05-15T10:20:26.075699336Z" level=info msg="shim disconnected" id=58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e May 15 10:20:26.075978 env[1221]: time="2025-05-15T10:20:26.075742376Z" level=warning msg="cleaning up after shim disconnected" id=58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e namespace=k8s.io May 15 10:20:26.075978 env[1221]: time="2025-05-15T10:20:26.075751455Z" level=info msg="cleaning up dead shim" May 15 10:20:26.086266 env[1221]: time="2025-05-15T10:20:26.086221016Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5961 runtime=io.containerd.runc.v2\n" May 15 10:20:26.091000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.091000 audit: BPF prog-id=232 op=LOAD May 15 10:20:26.091000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff615f898 a2=40 a3=fffff615f8c8 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.091000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.092000 audit: BPF prog-id=232 op=UNLOAD May 15 10:20:26.092000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.092000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff615f9b0 a2=50 a3=0 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.092000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff615f908 a2=28 a3=fffff615fa38 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff615f938 a2=28 a3=fffff615fa68 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff615f7e8 a2=28 a3=fffff615f918 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff615f958 a2=28 a3=fffff615fa88 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff615f938 a2=28 a3=fffff615fa68 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff615f928 a2=28 a3=fffff615fa58 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff615f958 a2=28 a3=fffff615fa88 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff615f938 a2=28 a3=fffff615fa68 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.101000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.101000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff615f958 a2=28 a3=fffff615fa88 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.101000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.102000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.102000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff615f928 a2=28 a3=fffff615fa58 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.102000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.102000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.102000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff615f9a8 a2=28 a3=fffff615fae8 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.102000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.102000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.102000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff615f6e0 a2=50 a3=0 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.102000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.103000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit: BPF prog-id=233 op=LOAD May 15 10:20:26.103000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff615f6e8 a2=94 a3=5 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.103000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.103000 audit: BPF prog-id=233 op=UNLOAD May 15 10:20:26.103000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.103000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff615f7f0 a2=50 a3=0 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.103000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff615f938 a2=4 a3=3 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { confidentiality } for pid=5948 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.104000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff615f918 a2=94 a3=6 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { confidentiality } for pid=5948 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.104000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff615f0e8 a2=94 a3=83 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { perfmon } for pid=5948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: AVC avc: denied { confidentiality } for pid=5948 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.104000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff615f0e8 a2=94 a3=83 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.104000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.104000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109478 env[1221]: time="2025-05-15T10:20:26.109029723Z" level=info msg="StopContainer for \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\" returns successfully" May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.108000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.108000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.109000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.109000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.109000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.110000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.110000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.110000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.110000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.110000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.110000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.110000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.110000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.110000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.110000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.110000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.110000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.110000 audit[5948]: AVC avc: denied { bpf } for pid=5948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.110000 audit[5948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff6160b28 a2=10 a3=fffff6160c18 items=0 ppid=5928 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 15 10:20:26.115050 env[1221]: time="2025-05-15T10:20:26.115017198Z" level=info msg="StopPodSandbox for \"370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a\"" May 15 10:20:26.115210 env[1221]: time="2025-05-15T10:20:26.115185356Z" level=info msg="Container to stop \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:20:26.117667 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a-shm.mount: Deactivated successfully. May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit: BPF prog-id=234 op=LOAD May 15 10:20:26.121000 audit[5980]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc5493ed8 a2=98 a3=ffffc5493ec8 items=0 ppid=5928 pid=5980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.121000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:20:26.121000 audit: BPF prog-id=234 op=UNLOAD May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit: BPF prog-id=235 op=LOAD May 15 10:20:26.121000 audit[5980]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc5493d88 a2=74 a3=95 items=0 ppid=5928 pid=5980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.121000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:20:26.121000 audit: BPF prog-id=235 op=UNLOAD May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { perfmon } for pid=5980 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit[5980]: AVC avc: denied { bpf } for pid=5980 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:26.121000 audit: BPF prog-id=236 op=LOAD May 15 10:20:26.121000 audit[5980]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc5493db8 a2=40 a3=ffffc5493de8 items=0 ppid=5928 pid=5980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.121000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:20:26.121000 audit: BPF prog-id=236 op=UNLOAD May 15 10:20:26.125696 systemd[1]: cri-containerd-370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a.scope: Deactivated successfully. May 15 10:20:26.124000 audit: BPF prog-id=118 op=UNLOAD May 15 10:20:26.128000 audit: BPF prog-id=121 op=UNLOAD May 15 10:20:26.145635 env[1221]: time="2025-05-15T10:20:26.145575686Z" level=info msg="shim disconnected" id=370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a May 15 10:20:26.145635 env[1221]: time="2025-05-15T10:20:26.145629446Z" level=warning msg="cleaning up after shim disconnected" id=370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a namespace=k8s.io May 15 10:20:26.145635 env[1221]: time="2025-05-15T10:20:26.145639725Z" level=info msg="cleaning up dead shim" May 15 10:20:26.153058 env[1221]: time="2025-05-15T10:20:26.152863591Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6002 runtime=io.containerd.runc.v2\n" May 15 10:20:26.169997 env[1221]: time="2025-05-15T10:20:26.169932341Z" level=info msg="TearDown network for sandbox \"370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a\" successfully" May 15 10:20:26.169997 env[1221]: time="2025-05-15T10:20:26.169996461Z" level=info msg="StopPodSandbox for \"370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a\" returns successfully" May 15 10:20:26.187169 kubelet[1959]: I0515 10:20:26.187117 1959 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6946697459-p4xv2" podStartSLOduration=4.187091651 podStartE2EDuration="4.187091651s" podCreationTimestamp="2025-05-15 10:20:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:20:23.464508045 +0000 UTC m=+76.403957118" watchObservedRunningTime="2025-05-15 10:20:26.187091651 +0000 UTC m=+79.126540724" May 15 10:20:26.193726 kubelet[1959]: E0515 10:20:26.193302 1959 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:26.196000 audit[6016]: NETFILTER_CFG table=filter:140 family=2 entries=8 op=nft_register_rule pid=6016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:26.196000 audit[6016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff95a06e0 a2=0 a3=1 items=0 ppid=2108 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:26.203000 audit[6016]: NETFILTER_CFG table=nat:141 family=2 entries=54 op=nft_register_rule pid=6016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:26.203000 audit[6016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=fffff95a06e0 a2=0 a3=1 items=0 ppid=2108 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:26.248014 kubelet[1959]: I0515 10:20:26.247855 1959 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/efa9cd6b-438f-414a-8d91-30668d873345-tigera-ca-bundle\") pod \"efa9cd6b-438f-414a-8d91-30668d873345\" (UID: \"efa9cd6b-438f-414a-8d91-30668d873345\") " May 15 10:20:26.248014 kubelet[1959]: I0515 10:20:26.247910 1959 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/efa9cd6b-438f-414a-8d91-30668d873345-typha-certs\") pod \"efa9cd6b-438f-414a-8d91-30668d873345\" (UID: \"efa9cd6b-438f-414a-8d91-30668d873345\") " May 15 10:20:26.248014 kubelet[1959]: I0515 10:20:26.247935 1959 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-c82j9\" (UniqueName: \"kubernetes.io/projected/efa9cd6b-438f-414a-8d91-30668d873345-kube-api-access-c82j9\") pod \"efa9cd6b-438f-414a-8d91-30668d873345\" (UID: \"efa9cd6b-438f-414a-8d91-30668d873345\") " May 15 10:20:26.252767 kubelet[1959]: I0515 10:20:26.252715 1959 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/efa9cd6b-438f-414a-8d91-30668d873345-kube-api-access-c82j9" (OuterVolumeSpecName: "kube-api-access-c82j9") pod "efa9cd6b-438f-414a-8d91-30668d873345" (UID: "efa9cd6b-438f-414a-8d91-30668d873345"). InnerVolumeSpecName "kube-api-access-c82j9". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 15 10:20:26.253171 kubelet[1959]: I0515 10:20:26.253142 1959 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/efa9cd6b-438f-414a-8d91-30668d873345-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "efa9cd6b-438f-414a-8d91-30668d873345" (UID: "efa9cd6b-438f-414a-8d91-30668d873345"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 15 10:20:26.253537 kubelet[1959]: I0515 10:20:26.253486 1959 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/efa9cd6b-438f-414a-8d91-30668d873345-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "efa9cd6b-438f-414a-8d91-30668d873345" (UID: "efa9cd6b-438f-414a-8d91-30668d873345"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 15 10:20:26.348341 kubelet[1959]: I0515 10:20:26.348307 1959 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/efa9cd6b-438f-414a-8d91-30668d873345-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 15 10:20:26.348530 kubelet[1959]: I0515 10:20:26.348517 1959 reconciler_common.go:299] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/efa9cd6b-438f-414a-8d91-30668d873345-typha-certs\") on node \"localhost\" DevicePath \"\"" May 15 10:20:26.348599 kubelet[1959]: I0515 10:20:26.348588 1959 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-c82j9\" (UniqueName: \"kubernetes.io/projected/efa9cd6b-438f-414a-8d91-30668d873345-kube-api-access-c82j9\") on node \"localhost\" DevicePath \"\"" May 15 10:20:26.464229 kubelet[1959]: I0515 10:20:26.464203 1959 scope.go:117] "RemoveContainer" containerID="58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e" May 15 10:20:26.469211 systemd[1]: Removed slice kubepods-besteffort-podefa9cd6b_438f_414a_8d91_30668d873345.slice. May 15 10:20:26.470008 env[1221]: time="2025-05-15T10:20:26.469953066Z" level=info msg="RemoveContainer for \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\"" May 15 10:20:26.473346 env[1221]: time="2025-05-15T10:20:26.473313321Z" level=info msg="RemoveContainer for \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\" returns successfully" May 15 10:20:26.473492 kubelet[1959]: I0515 10:20:26.473468 1959 scope.go:117] "RemoveContainer" containerID="58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e" May 15 10:20:26.473723 env[1221]: time="2025-05-15T10:20:26.473651558Z" level=error msg="ContainerStatus for \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\": not found" May 15 10:20:26.473861 kubelet[1959]: E0515 10:20:26.473837 1959 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\": not found" containerID="58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e" May 15 10:20:26.473961 kubelet[1959]: I0515 10:20:26.473938 1959 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e"} err="failed to get container status \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\": rpc error: code = NotFound desc = an error occurred when try to find container \"58fc3751ec6b4c7e8b0bf55e2e10d668b7df7c9a9ade58ac0cffdd81b522f97e\": not found" May 15 10:20:26.481279 systemd[1]: var-lib-kubelet-pods-efa9cd6b\x2d438f\x2d414a\x2d8d91\x2d30668d873345-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 15 10:20:26.481381 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-370ccfd281181809bcd7f8bee9c8cc13da32fdf1d53e478ac1760a33a493690a-rootfs.mount: Deactivated successfully. May 15 10:20:26.481443 systemd[1]: var-lib-kubelet-pods-efa9cd6b\x2d438f\x2d414a\x2d8d91\x2d30668d873345-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dc82j9.mount: Deactivated successfully. May 15 10:20:26.481512 systemd[1]: var-lib-kubelet-pods-efa9cd6b\x2d438f\x2d414a\x2d8d91\x2d30668d873345-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 15 10:20:27.194990 kubelet[1959]: I0515 10:20:27.194943 1959 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="efa9cd6b-438f-414a-8d91-30668d873345" path="/var/lib/kubelet/pods/efa9cd6b-438f-414a-8d91-30668d873345/volumes" May 15 10:20:29.193382 systemd[1]: Started sshd@23-10.0.0.84:22-10.0.0.1:37814.service. May 15 10:20:29.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.84:22-10.0.0.1:37814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:29.196654 kernel: kauditd_printk_skb: 657 callbacks suppressed May 15 10:20:29.196747 kernel: audit: type=1130 audit(1747304429.192:1729): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.84:22-10.0.0.1:37814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:20:29.224000 audit[6073]: USER_ACCT pid=6073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.225666 sshd[6073]: Accepted publickey for core from 10.0.0.1 port 37814 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:20:29.226739 sshd[6073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:20:29.225000 audit[6073]: CRED_ACQ pid=6073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.230114 kernel: audit: type=1101 audit(1747304429.224:1730): pid=6073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.230175 kernel: audit: type=1103 audit(1747304429.225:1731): pid=6073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.233462 kernel: audit: type=1006 audit(1747304429.225:1732): pid=6073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 10:20:29.233534 kernel: audit: type=1300 audit(1747304429.225:1732): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd66c6a90 a2=3 a3=1 items=0 ppid=1 pid=6073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:29.225000 audit[6073]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd66c6a90 a2=3 a3=1 items=0 ppid=1 pid=6073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:29.232831 systemd[1]: Started session-24.scope. May 15 10:20:29.233160 systemd-logind[1207]: New session 24 of user core. May 15 10:20:29.225000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:20:29.235604 kernel: audit: type=1327 audit(1747304429.225:1732): proctitle=737368643A20636F7265205B707269765D May 15 10:20:29.236000 audit[6073]: USER_START pid=6073 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.237000 audit[6076]: CRED_ACQ pid=6076 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.245650 kernel: audit: type=1105 audit(1747304429.236:1733): pid=6073 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.245733 kernel: audit: type=1103 audit(1747304429.237:1734): pid=6076 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.363713 sshd[6073]: pam_unix(sshd:session): session closed for user core May 15 10:20:29.365000 audit[6073]: USER_END pid=6073 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.368440 systemd[1]: sshd@23-10.0.0.84:22-10.0.0.1:37814.service: Deactivated successfully. May 15 10:20:29.369227 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:20:29.365000 audit[6073]: CRED_DISP pid=6073 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.369729 systemd-logind[1207]: Session 24 logged out. Waiting for processes to exit. May 15 10:20:29.370822 systemd-logind[1207]: Removed session 24. May 15 10:20:29.371860 kernel: audit: type=1106 audit(1747304429.365:1735): pid=6073 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.371932 kernel: audit: type=1104 audit(1747304429.365:1736): pid=6073 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:20:29.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.84:22-10.0.0.1:37814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'