May 13 00:38:13.841757 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 00:38:13.841776 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:38:13.841784 kernel: BIOS-provided physical RAM map: May 13 00:38:13.841790 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 13 00:38:13.841795 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 13 00:38:13.841800 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 13 00:38:13.841807 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 13 00:38:13.841813 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 13 00:38:13.841819 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:38:13.841825 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 13 00:38:13.841830 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 13 00:38:13.841836 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 13 00:38:13.841841 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 13 00:38:13.841847 kernel: NX (Execute Disable) protection: active May 13 00:38:13.841855 kernel: SMBIOS 2.8 present. May 13 00:38:13.841861 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 13 00:38:13.841867 kernel: Hypervisor detected: KVM May 13 00:38:13.841872 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 00:38:13.841878 kernel: kvm-clock: cpu 0, msr 13196001, primary cpu clock May 13 00:38:13.841884 kernel: kvm-clock: using sched offset of 2410530745 cycles May 13 00:38:13.841891 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 00:38:13.841897 kernel: tsc: Detected 2794.746 MHz processor May 13 00:38:13.841903 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 00:38:13.841911 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 00:38:13.841917 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 13 00:38:13.841923 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 00:38:13.841929 kernel: Using GB pages for direct mapping May 13 00:38:13.841935 kernel: ACPI: Early table checksum verification disabled May 13 00:38:13.841942 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 13 00:38:13.841948 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:38:13.841954 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:38:13.841960 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:38:13.841967 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 13 00:38:13.841973 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:38:13.841979 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:38:13.841985 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:38:13.841991 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:38:13.841997 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 13 00:38:13.842003 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 13 00:38:13.842009 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 13 00:38:13.842018 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 13 00:38:13.842025 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 13 00:38:13.842031 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 13 00:38:13.842038 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 13 00:38:13.842044 kernel: No NUMA configuration found May 13 00:38:13.842051 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 13 00:38:13.842058 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 13 00:38:13.842065 kernel: Zone ranges: May 13 00:38:13.842071 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 00:38:13.842078 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 13 00:38:13.842084 kernel: Normal empty May 13 00:38:13.842091 kernel: Movable zone start for each node May 13 00:38:13.842097 kernel: Early memory node ranges May 13 00:38:13.842103 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 13 00:38:13.842110 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 13 00:38:13.842116 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 13 00:38:13.842124 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:38:13.842130 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 13 00:38:13.842137 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 13 00:38:13.842143 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 00:38:13.842150 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 00:38:13.842156 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 00:38:13.842163 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 00:38:13.842169 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 00:38:13.842176 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 00:38:13.842184 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 00:38:13.842190 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 00:38:13.842196 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 00:38:13.842203 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 13 00:38:13.842209 kernel: TSC deadline timer available May 13 00:38:13.842216 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 13 00:38:13.842222 kernel: kvm-guest: KVM setup pv remote TLB flush May 13 00:38:13.842229 kernel: kvm-guest: setup PV sched yield May 13 00:38:13.842235 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 13 00:38:13.842243 kernel: Booting paravirtualized kernel on KVM May 13 00:38:13.842249 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 00:38:13.842256 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 13 00:38:13.842263 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 13 00:38:13.842269 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 13 00:38:13.842275 kernel: pcpu-alloc: [0] 0 1 2 3 May 13 00:38:13.842282 kernel: kvm-guest: setup async PF for cpu 0 May 13 00:38:13.842288 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 13 00:38:13.842294 kernel: kvm-guest: PV spinlocks enabled May 13 00:38:13.842302 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 13 00:38:13.842308 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 13 00:38:13.842315 kernel: Policy zone: DMA32 May 13 00:38:13.842322 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:38:13.842329 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:38:13.842336 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:38:13.842343 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:38:13.842349 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:38:13.842357 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 134796K reserved, 0K cma-reserved) May 13 00:38:13.842363 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:38:13.842370 kernel: ftrace: allocating 34584 entries in 136 pages May 13 00:38:13.842376 kernel: ftrace: allocated 136 pages with 2 groups May 13 00:38:13.842383 kernel: rcu: Hierarchical RCU implementation. May 13 00:38:13.842390 kernel: rcu: RCU event tracing is enabled. May 13 00:38:13.842397 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:38:13.842403 kernel: Rude variant of Tasks RCU enabled. May 13 00:38:13.842410 kernel: Tracing variant of Tasks RCU enabled. May 13 00:38:13.842418 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:38:13.842424 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:38:13.842431 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 13 00:38:13.842437 kernel: random: crng init done May 13 00:38:13.842444 kernel: Console: colour VGA+ 80x25 May 13 00:38:13.842450 kernel: printk: console [ttyS0] enabled May 13 00:38:13.842457 kernel: ACPI: Core revision 20210730 May 13 00:38:13.842463 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 13 00:38:13.842470 kernel: APIC: Switch to symmetric I/O mode setup May 13 00:38:13.842477 kernel: x2apic enabled May 13 00:38:13.842483 kernel: Switched APIC routing to physical x2apic. May 13 00:38:13.842490 kernel: kvm-guest: setup PV IPIs May 13 00:38:13.842496 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 00:38:13.842503 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 00:38:13.842509 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794746) May 13 00:38:13.842516 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 13 00:38:13.842523 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 13 00:38:13.842529 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 13 00:38:13.842540 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 00:38:13.842557 kernel: Spectre V2 : Mitigation: Retpolines May 13 00:38:13.842564 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 00:38:13.842571 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 13 00:38:13.842578 kernel: RETBleed: Mitigation: untrained return thunk May 13 00:38:13.842585 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 13 00:38:13.842592 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 13 00:38:13.842606 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 13 00:38:13.842613 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 13 00:38:13.842621 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 13 00:38:13.842628 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 13 00:38:13.842635 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 13 00:38:13.842642 kernel: Freeing SMP alternatives memory: 32K May 13 00:38:13.842649 kernel: pid_max: default: 32768 minimum: 301 May 13 00:38:13.842656 kernel: LSM: Security Framework initializing May 13 00:38:13.842663 kernel: SELinux: Initializing. May 13 00:38:13.842670 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:38:13.842677 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:38:13.842684 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 13 00:38:13.842691 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 13 00:38:13.842698 kernel: ... version: 0 May 13 00:38:13.842705 kernel: ... bit width: 48 May 13 00:38:13.842712 kernel: ... generic registers: 6 May 13 00:38:13.842718 kernel: ... value mask: 0000ffffffffffff May 13 00:38:13.842725 kernel: ... max period: 00007fffffffffff May 13 00:38:13.842732 kernel: ... fixed-purpose events: 0 May 13 00:38:13.842739 kernel: ... event mask: 000000000000003f May 13 00:38:13.842746 kernel: signal: max sigframe size: 1776 May 13 00:38:13.842753 kernel: rcu: Hierarchical SRCU implementation. May 13 00:38:13.842760 kernel: smp: Bringing up secondary CPUs ... May 13 00:38:13.842767 kernel: x86: Booting SMP configuration: May 13 00:38:13.842773 kernel: .... node #0, CPUs: #1 May 13 00:38:13.842780 kernel: kvm-clock: cpu 1, msr 13196041, secondary cpu clock May 13 00:38:13.842787 kernel: kvm-guest: setup async PF for cpu 1 May 13 00:38:13.842794 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 13 00:38:13.842801 kernel: #2 May 13 00:38:13.842808 kernel: kvm-clock: cpu 2, msr 13196081, secondary cpu clock May 13 00:38:13.842815 kernel: kvm-guest: setup async PF for cpu 2 May 13 00:38:13.842822 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 13 00:38:13.842828 kernel: #3 May 13 00:38:13.842835 kernel: kvm-clock: cpu 3, msr 131960c1, secondary cpu clock May 13 00:38:13.842842 kernel: kvm-guest: setup async PF for cpu 3 May 13 00:38:13.842849 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 13 00:38:13.842855 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:38:13.842862 kernel: smpboot: Max logical packages: 1 May 13 00:38:13.842870 kernel: smpboot: Total of 4 processors activated (22357.96 BogoMIPS) May 13 00:38:13.842877 kernel: devtmpfs: initialized May 13 00:38:13.842883 kernel: x86/mm: Memory block size: 128MB May 13 00:38:13.842890 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:38:13.842897 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:38:13.842904 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:38:13.842911 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:38:13.842918 kernel: audit: initializing netlink subsys (disabled) May 13 00:38:13.842924 kernel: audit: type=2000 audit(1747096694.162:1): state=initialized audit_enabled=0 res=1 May 13 00:38:13.842932 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:38:13.842939 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 00:38:13.842946 kernel: cpuidle: using governor menu May 13 00:38:13.842952 kernel: ACPI: bus type PCI registered May 13 00:38:13.842959 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:38:13.842966 kernel: dca service started, version 1.12.1 May 13 00:38:13.842973 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 13 00:38:13.842980 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 13 00:38:13.842987 kernel: PCI: Using configuration type 1 for base access May 13 00:38:13.842995 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 00:38:13.843002 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:38:13.843009 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:38:13.843015 kernel: ACPI: Added _OSI(Module Device) May 13 00:38:13.843022 kernel: ACPI: Added _OSI(Processor Device) May 13 00:38:13.843029 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:38:13.843036 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:38:13.843042 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:38:13.843049 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:38:13.843057 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:38:13.843064 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:38:13.843071 kernel: ACPI: Interpreter enabled May 13 00:38:13.843077 kernel: ACPI: PM: (supports S0 S3 S5) May 13 00:38:13.843084 kernel: ACPI: Using IOAPIC for interrupt routing May 13 00:38:13.843091 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 00:38:13.843098 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 13 00:38:13.843105 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:38:13.843219 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:38:13.843294 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 13 00:38:13.843363 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 13 00:38:13.843372 kernel: PCI host bridge to bus 0000:00 May 13 00:38:13.843444 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 00:38:13.843506 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 00:38:13.843579 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 00:38:13.843653 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 13 00:38:13.843715 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 00:38:13.843774 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 13 00:38:13.843834 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:38:13.843916 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 13 00:38:13.843990 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 13 00:38:13.844063 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 13 00:38:13.844130 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 13 00:38:13.844196 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 13 00:38:13.844262 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 00:38:13.844343 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:38:13.844412 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 13 00:38:13.844484 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 13 00:38:13.844570 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 13 00:38:13.844662 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 13 00:38:13.844736 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 13 00:38:13.844805 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 13 00:38:13.844873 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 13 00:38:13.844951 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 13 00:38:13.845020 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 13 00:38:13.845091 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 13 00:38:13.845158 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 13 00:38:13.845226 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 13 00:38:13.845297 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 13 00:38:13.845367 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 13 00:38:13.845442 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 13 00:38:13.845511 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 13 00:38:13.846041 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 13 00:38:13.846125 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 13 00:38:13.846206 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 13 00:38:13.846215 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 00:38:13.846223 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 00:38:13.846230 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 00:38:13.846236 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 00:38:13.846247 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 13 00:38:13.846254 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 13 00:38:13.846261 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 13 00:38:13.846267 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 13 00:38:13.846274 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 13 00:38:13.846281 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 13 00:38:13.846288 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 13 00:38:13.846294 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 13 00:38:13.846301 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 13 00:38:13.846309 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 13 00:38:13.846316 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 13 00:38:13.846323 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 13 00:38:13.846329 kernel: iommu: Default domain type: Translated May 13 00:38:13.846336 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 00:38:13.846407 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 13 00:38:13.850185 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 00:38:13.850287 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 13 00:38:13.850297 kernel: vgaarb: loaded May 13 00:38:13.850308 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:38:13.850315 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:38:13.850322 kernel: PTP clock support registered May 13 00:38:13.850329 kernel: PCI: Using ACPI for IRQ routing May 13 00:38:13.850336 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 00:38:13.850343 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 13 00:38:13.850350 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 13 00:38:13.850357 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 13 00:38:13.850364 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 13 00:38:13.850372 kernel: clocksource: Switched to clocksource kvm-clock May 13 00:38:13.850378 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:38:13.850385 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:38:13.850392 kernel: pnp: PnP ACPI init May 13 00:38:13.850497 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 13 00:38:13.850508 kernel: pnp: PnP ACPI: found 6 devices May 13 00:38:13.850515 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 00:38:13.850522 kernel: NET: Registered PF_INET protocol family May 13 00:38:13.850532 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:38:13.850539 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:38:13.850557 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:38:13.850573 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:38:13.850580 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:38:13.850587 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:38:13.850594 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:38:13.850610 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:38:13.850617 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:38:13.850632 kernel: NET: Registered PF_XDP protocol family May 13 00:38:13.850725 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 00:38:13.850819 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 00:38:13.850916 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 00:38:13.850978 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 13 00:38:13.851036 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 13 00:38:13.851093 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 13 00:38:13.851102 kernel: PCI: CLS 0 bytes, default 64 May 13 00:38:13.851112 kernel: Initialise system trusted keyrings May 13 00:38:13.851119 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:38:13.851126 kernel: Key type asymmetric registered May 13 00:38:13.851133 kernel: Asymmetric key parser 'x509' registered May 13 00:38:13.851140 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:38:13.851147 kernel: io scheduler mq-deadline registered May 13 00:38:13.851154 kernel: io scheduler kyber registered May 13 00:38:13.851161 kernel: io scheduler bfq registered May 13 00:38:13.851168 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 00:38:13.851177 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 13 00:38:13.851184 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 13 00:38:13.851191 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 13 00:38:13.851198 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:38:13.851205 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 00:38:13.851212 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 00:38:13.851219 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 00:38:13.851226 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 00:38:13.851234 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 00:38:13.851308 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 00:38:13.851373 kernel: rtc_cmos 00:04: registered as rtc0 May 13 00:38:13.851435 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T00:38:13 UTC (1747096693) May 13 00:38:13.851497 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 13 00:38:13.851506 kernel: NET: Registered PF_INET6 protocol family May 13 00:38:13.851513 kernel: Segment Routing with IPv6 May 13 00:38:13.851520 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:38:13.851527 kernel: NET: Registered PF_PACKET protocol family May 13 00:38:13.851536 kernel: Key type dns_resolver registered May 13 00:38:13.851542 kernel: IPI shorthand broadcast: enabled May 13 00:38:13.851608 kernel: sched_clock: Marking stable (434280337, 101142422)->(548622772, -13200013) May 13 00:38:13.851615 kernel: registered taskstats version 1 May 13 00:38:13.851623 kernel: Loading compiled-in X.509 certificates May 13 00:38:13.851630 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 00:38:13.851637 kernel: Key type .fscrypt registered May 13 00:38:13.851644 kernel: Key type fscrypt-provisioning registered May 13 00:38:13.851651 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:38:13.851660 kernel: ima: Allocated hash algorithm: sha1 May 13 00:38:13.851667 kernel: ima: No architecture policies found May 13 00:38:13.851674 kernel: clk: Disabling unused clocks May 13 00:38:13.851681 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 00:38:13.851687 kernel: Write protecting the kernel read-only data: 28672k May 13 00:38:13.851694 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 00:38:13.851702 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 00:38:13.851708 kernel: Run /init as init process May 13 00:38:13.851715 kernel: with arguments: May 13 00:38:13.851723 kernel: /init May 13 00:38:13.851730 kernel: with environment: May 13 00:38:13.851736 kernel: HOME=/ May 13 00:38:13.851743 kernel: TERM=linux May 13 00:38:13.851750 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:38:13.851759 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:38:13.851768 systemd[1]: Detected virtualization kvm. May 13 00:38:13.851776 systemd[1]: Detected architecture x86-64. May 13 00:38:13.851784 systemd[1]: Running in initrd. May 13 00:38:13.851791 systemd[1]: No hostname configured, using default hostname. May 13 00:38:13.851798 systemd[1]: Hostname set to . May 13 00:38:13.851806 systemd[1]: Initializing machine ID from VM UUID. May 13 00:38:13.851813 systemd[1]: Queued start job for default target initrd.target. May 13 00:38:13.851821 systemd[1]: Started systemd-ask-password-console.path. May 13 00:38:13.851828 systemd[1]: Reached target cryptsetup.target. May 13 00:38:13.851835 systemd[1]: Reached target paths.target. May 13 00:38:13.851844 systemd[1]: Reached target slices.target. May 13 00:38:13.851857 systemd[1]: Reached target swap.target. May 13 00:38:13.851865 systemd[1]: Reached target timers.target. May 13 00:38:13.851873 systemd[1]: Listening on iscsid.socket. May 13 00:38:13.851881 systemd[1]: Listening on iscsiuio.socket. May 13 00:38:13.851889 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:38:13.851897 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:38:13.851905 systemd[1]: Listening on systemd-journald.socket. May 13 00:38:13.851912 systemd[1]: Listening on systemd-networkd.socket. May 13 00:38:13.851920 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:38:13.851928 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:38:13.851935 systemd[1]: Reached target sockets.target. May 13 00:38:13.851943 systemd[1]: Starting kmod-static-nodes.service... May 13 00:38:13.851951 systemd[1]: Finished network-cleanup.service. May 13 00:38:13.851959 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:38:13.851967 systemd[1]: Starting systemd-journald.service... May 13 00:38:13.851975 systemd[1]: Starting systemd-modules-load.service... May 13 00:38:13.851982 systemd[1]: Starting systemd-resolved.service... May 13 00:38:13.851990 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:38:13.851998 systemd[1]: Finished kmod-static-nodes.service. May 13 00:38:13.852005 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:38:13.852013 kernel: audit: type=1130 audit(1747096693.840:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.852021 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:38:13.852030 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:38:13.852040 systemd-journald[198]: Journal started May 13 00:38:13.852077 systemd-journald[198]: Runtime Journal (/run/log/journal/2da543d51e9041cf8c2951fe163f95a3) is 6.0M, max 48.5M, 42.5M free. May 13 00:38:13.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.850903 systemd-modules-load[199]: Inserted module 'overlay' May 13 00:38:13.884371 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:38:13.884397 kernel: audit: type=1130 audit(1747096693.883:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.857243 systemd-resolved[200]: Positive Trust Anchors: May 13 00:38:13.888356 systemd[1]: Started systemd-journald.service. May 13 00:38:13.857260 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:38:13.857287 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:38:13.889800 kernel: Bridge firewalling registered May 13 00:38:13.859388 systemd-resolved[200]: Defaulting to hostname 'linux'. May 13 00:38:13.896907 systemd-modules-load[199]: Inserted module 'br_netfilter' May 13 00:38:13.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.898754 systemd[1]: Started systemd-resolved.service. May 13 00:38:13.905237 kernel: audit: type=1130 audit(1747096693.898:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.905261 kernel: audit: type=1130 audit(1747096693.901:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.902562 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:38:13.910366 kernel: audit: type=1130 audit(1747096693.906:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.906784 systemd[1]: Reached target nss-lookup.target. May 13 00:38:13.911972 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:38:13.915566 kernel: SCSI subsystem initialized May 13 00:38:13.925585 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:38:13.931793 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:38:13.931815 kernel: device-mapper: uevent: version 1.0.3 May 13 00:38:13.931825 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:38:13.931835 kernel: audit: type=1130 audit(1747096693.925:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.926773 systemd[1]: Starting dracut-cmdline.service... May 13 00:38:13.935023 systemd-modules-load[199]: Inserted module 'dm_multipath' May 13 00:38:13.935799 systemd[1]: Finished systemd-modules-load.service. May 13 00:38:13.940363 kernel: audit: type=1130 audit(1747096693.935:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.939110 systemd[1]: Starting systemd-sysctl.service... May 13 00:38:13.944916 systemd[1]: Finished systemd-sysctl.service. May 13 00:38:13.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.949589 kernel: audit: type=1130 audit(1747096693.945:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:13.949758 dracut-cmdline[215]: dracut-dracut-053 May 13 00:38:13.952319 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:38:14.007568 kernel: Loading iSCSI transport class v2.0-870. May 13 00:38:14.023572 kernel: iscsi: registered transport (tcp) May 13 00:38:14.043947 kernel: iscsi: registered transport (qla4xxx) May 13 00:38:14.043969 kernel: QLogic iSCSI HBA Driver May 13 00:38:14.070957 systemd[1]: Finished dracut-cmdline.service. May 13 00:38:14.075365 kernel: audit: type=1130 audit(1747096694.070:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:14.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:14.071754 systemd[1]: Starting dracut-pre-udev.service... May 13 00:38:14.118566 kernel: raid6: avx2x4 gen() 30936 MB/s May 13 00:38:14.135564 kernel: raid6: avx2x4 xor() 8417 MB/s May 13 00:38:14.152563 kernel: raid6: avx2x2 gen() 32478 MB/s May 13 00:38:14.169561 kernel: raid6: avx2x2 xor() 18952 MB/s May 13 00:38:14.186562 kernel: raid6: avx2x1 gen() 26614 MB/s May 13 00:38:14.203565 kernel: raid6: avx2x1 xor() 15304 MB/s May 13 00:38:14.220564 kernel: raid6: sse2x4 gen() 13999 MB/s May 13 00:38:14.237562 kernel: raid6: sse2x4 xor() 7467 MB/s May 13 00:38:14.254564 kernel: raid6: sse2x2 gen() 16291 MB/s May 13 00:38:14.271563 kernel: raid6: sse2x2 xor() 9638 MB/s May 13 00:38:14.288564 kernel: raid6: sse2x1 gen() 12347 MB/s May 13 00:38:14.305957 kernel: raid6: sse2x1 xor() 7781 MB/s May 13 00:38:14.305970 kernel: raid6: using algorithm avx2x2 gen() 32478 MB/s May 13 00:38:14.305979 kernel: raid6: .... xor() 18952 MB/s, rmw enabled May 13 00:38:14.306685 kernel: raid6: using avx2x2 recovery algorithm May 13 00:38:14.318569 kernel: xor: automatically using best checksumming function avx May 13 00:38:14.407576 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 00:38:14.415151 systemd[1]: Finished dracut-pre-udev.service. May 13 00:38:14.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:14.416000 audit: BPF prog-id=7 op=LOAD May 13 00:38:14.416000 audit: BPF prog-id=8 op=LOAD May 13 00:38:14.417545 systemd[1]: Starting systemd-udevd.service... May 13 00:38:14.428403 systemd-udevd[398]: Using default interface naming scheme 'v252'. May 13 00:38:14.432036 systemd[1]: Started systemd-udevd.service. May 13 00:38:14.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:14.432756 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:38:14.441965 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation May 13 00:38:14.464522 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:38:14.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:14.466867 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:38:14.496719 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:38:14.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:14.522571 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:38:14.529083 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:38:14.529096 kernel: GPT:9289727 != 19775487 May 13 00:38:14.529104 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:38:14.529113 kernel: GPT:9289727 != 19775487 May 13 00:38:14.529121 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:38:14.529129 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:38:14.529139 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:38:14.539651 kernel: AVX2 version of gcm_enc/dec engaged. May 13 00:38:14.539690 kernel: libata version 3.00 loaded. May 13 00:38:14.539701 kernel: AES CTR mode by8 optimization enabled May 13 00:38:14.557598 kernel: ahci 0000:00:1f.2: version 3.0 May 13 00:38:14.568467 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (444) May 13 00:38:14.568484 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 13 00:38:14.568493 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 13 00:38:14.568661 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 13 00:38:14.568743 kernel: scsi host0: ahci May 13 00:38:14.568829 kernel: scsi host1: ahci May 13 00:38:14.568909 kernel: scsi host2: ahci May 13 00:38:14.568998 kernel: scsi host3: ahci May 13 00:38:14.569086 kernel: scsi host4: ahci May 13 00:38:14.569180 kernel: scsi host5: ahci May 13 00:38:14.569264 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 13 00:38:14.569274 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 13 00:38:14.569283 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 13 00:38:14.569291 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 13 00:38:14.569300 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 13 00:38:14.569308 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 13 00:38:14.566497 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:38:14.600688 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:38:14.606049 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:38:14.612920 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:38:14.618525 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:38:14.620965 systemd[1]: Starting disk-uuid.service... May 13 00:38:14.632735 disk-uuid[521]: Primary Header is updated. May 13 00:38:14.632735 disk-uuid[521]: Secondary Entries is updated. May 13 00:38:14.632735 disk-uuid[521]: Secondary Header is updated. May 13 00:38:14.636562 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:38:14.638576 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:38:14.641572 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:38:14.885166 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 13 00:38:14.885239 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 13 00:38:14.885249 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 13 00:38:14.885258 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 13 00:38:14.885266 kernel: ata3.00: applying bridge limits May 13 00:38:14.885275 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 13 00:38:14.885283 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 13 00:38:14.886568 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 13 00:38:14.887575 kernel: ata3.00: configured for UDMA/100 May 13 00:38:14.888589 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 13 00:38:14.919569 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 13 00:38:14.937028 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 13 00:38:14.937040 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 13 00:38:15.642574 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:38:15.642849 disk-uuid[522]: The operation has completed successfully. May 13 00:38:15.663877 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:38:15.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.663965 systemd[1]: Finished disk-uuid.service. May 13 00:38:15.670520 systemd[1]: Starting verity-setup.service... May 13 00:38:15.682579 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 13 00:38:15.701129 systemd[1]: Found device dev-mapper-usr.device. May 13 00:38:15.703010 systemd[1]: Mounting sysusr-usr.mount... May 13 00:38:15.705754 systemd[1]: Finished verity-setup.service. May 13 00:38:15.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.761603 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:38:15.761691 systemd[1]: Mounted sysusr-usr.mount. May 13 00:38:15.762755 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:38:15.763339 systemd[1]: Starting ignition-setup.service... May 13 00:38:15.764860 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:38:15.772151 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:38:15.772180 kernel: BTRFS info (device vda6): using free space tree May 13 00:38:15.772194 kernel: BTRFS info (device vda6): has skinny extents May 13 00:38:15.779841 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:38:15.787875 systemd[1]: Finished ignition-setup.service. May 13 00:38:15.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.790741 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:38:15.824290 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:38:15.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.826000 audit: BPF prog-id=9 op=LOAD May 13 00:38:15.827185 systemd[1]: Starting systemd-networkd.service... May 13 00:38:15.830133 ignition[652]: Ignition 2.14.0 May 13 00:38:15.830145 ignition[652]: Stage: fetch-offline May 13 00:38:15.830202 ignition[652]: no configs at "/usr/lib/ignition/base.d" May 13 00:38:15.830213 ignition[652]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:38:15.831737 ignition[652]: parsed url from cmdline: "" May 13 00:38:15.831745 ignition[652]: no config URL provided May 13 00:38:15.831752 ignition[652]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:38:15.831762 ignition[652]: no config at "/usr/lib/ignition/user.ign" May 13 00:38:15.832836 ignition[652]: op(1): [started] loading QEMU firmware config module May 13 00:38:15.832844 ignition[652]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:38:15.839957 ignition[652]: op(1): [finished] loading QEMU firmware config module May 13 00:38:15.839997 ignition[652]: QEMU firmware config was not found. Ignoring... May 13 00:38:15.854864 systemd-networkd[719]: lo: Link UP May 13 00:38:15.854874 systemd-networkd[719]: lo: Gained carrier May 13 00:38:15.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.855247 systemd-networkd[719]: Enumeration completed May 13 00:38:15.855310 systemd[1]: Started systemd-networkd.service. May 13 00:38:15.856411 systemd-networkd[719]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:38:15.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.857750 systemd[1]: Reached target network.target. May 13 00:38:15.858205 systemd-networkd[719]: eth0: Link UP May 13 00:38:15.858208 systemd-networkd[719]: eth0: Gained carrier May 13 00:38:15.870378 iscsid[725]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:38:15.870378 iscsid[725]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 13 00:38:15.870378 iscsid[725]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:38:15.870378 iscsid[725]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:38:15.870378 iscsid[725]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:38:15.870378 iscsid[725]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:38:15.870378 iscsid[725]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:38:15.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.860695 systemd[1]: Starting iscsiuio.service... May 13 00:38:15.864298 systemd[1]: Started iscsiuio.service. May 13 00:38:15.866971 systemd[1]: Starting iscsid.service... May 13 00:38:15.870425 systemd[1]: Started iscsid.service. May 13 00:38:15.871938 systemd[1]: Starting dracut-initqueue.service... May 13 00:38:15.880730 systemd[1]: Finished dracut-initqueue.service. May 13 00:38:15.883175 systemd[1]: Reached target remote-fs-pre.target. May 13 00:38:15.885655 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:38:15.885713 systemd[1]: Reached target remote-fs.target. May 13 00:38:15.886439 systemd[1]: Starting dracut-pre-mount.service... May 13 00:38:15.892226 systemd[1]: Finished dracut-pre-mount.service. May 13 00:38:15.915508 ignition[652]: parsing config with SHA512: fba627ab44ebad08936836f80f982f0b9c81e1b961164e9f4a14f965774d210285185ef5a27014caee5d51043dcd44fab92b7395e0f3586ac6b8d0e2206821b2 May 13 00:38:15.922026 unknown[652]: fetched base config from "system" May 13 00:38:15.922037 unknown[652]: fetched user config from "qemu" May 13 00:38:15.922419 ignition[652]: fetch-offline: fetch-offline passed May 13 00:38:15.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.922657 systemd-networkd[719]: eth0: DHCPv4 address 10.0.0.18/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:38:15.922463 ignition[652]: Ignition finished successfully May 13 00:38:15.923381 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:38:15.925114 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:38:15.925759 systemd[1]: Starting ignition-kargs.service... May 13 00:38:15.936210 ignition[740]: Ignition 2.14.0 May 13 00:38:15.936220 ignition[740]: Stage: kargs May 13 00:38:15.936324 ignition[740]: no configs at "/usr/lib/ignition/base.d" May 13 00:38:15.936336 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:38:15.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.939155 systemd[1]: Finished ignition-kargs.service. May 13 00:38:15.937510 ignition[740]: kargs: kargs passed May 13 00:38:15.941601 systemd[1]: Starting ignition-disks.service... May 13 00:38:15.937577 ignition[740]: Ignition finished successfully May 13 00:38:15.948393 ignition[746]: Ignition 2.14.0 May 13 00:38:15.948403 ignition[746]: Stage: disks May 13 00:38:15.948485 ignition[746]: no configs at "/usr/lib/ignition/base.d" May 13 00:38:15.948494 ignition[746]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:38:15.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.950130 systemd[1]: Finished ignition-disks.service. May 13 00:38:15.949337 ignition[746]: disks: disks passed May 13 00:38:15.951771 systemd[1]: Reached target initrd-root-device.target. May 13 00:38:15.949365 ignition[746]: Ignition finished successfully May 13 00:38:15.953679 systemd[1]: Reached target local-fs-pre.target. May 13 00:38:15.954508 systemd[1]: Reached target local-fs.target. May 13 00:38:15.955303 systemd[1]: Reached target sysinit.target. May 13 00:38:15.956795 systemd[1]: Reached target basic.target. May 13 00:38:15.957458 systemd[1]: Starting systemd-fsck-root.service... May 13 00:38:15.968658 systemd-fsck[754]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 13 00:38:15.974883 systemd[1]: Finished systemd-fsck-root.service. May 13 00:38:15.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:15.976725 systemd[1]: Mounting sysroot.mount... May 13 00:38:15.983567 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:38:15.984029 systemd[1]: Mounted sysroot.mount. May 13 00:38:15.984770 systemd[1]: Reached target initrd-root-fs.target. May 13 00:38:15.987072 systemd[1]: Mounting sysroot-usr.mount... May 13 00:38:15.987992 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:38:15.988018 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:38:15.988036 systemd[1]: Reached target ignition-diskful.target. May 13 00:38:15.989936 systemd[1]: Mounted sysroot-usr.mount. May 13 00:38:15.991949 systemd[1]: Starting initrd-setup-root.service... May 13 00:38:15.996721 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:38:15.999195 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory May 13 00:38:16.002948 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:38:16.006380 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:38:16.028338 systemd[1]: Finished initrd-setup-root.service. May 13 00:38:16.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:16.029912 systemd[1]: Starting ignition-mount.service... May 13 00:38:16.031084 systemd[1]: Starting sysroot-boot.service... May 13 00:38:16.036797 bash[806]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:38:16.043913 ignition[807]: INFO : Ignition 2.14.0 May 13 00:38:16.043913 ignition[807]: INFO : Stage: mount May 13 00:38:16.045753 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:38:16.045753 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:38:16.045753 ignition[807]: INFO : mount: mount passed May 13 00:38:16.045753 ignition[807]: INFO : Ignition finished successfully May 13 00:38:16.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:16.046007 systemd[1]: Finished sysroot-boot.service. May 13 00:38:16.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:16.048712 systemd[1]: Finished ignition-mount.service. May 13 00:38:16.712487 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:38:16.719567 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (815) May 13 00:38:16.719598 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:38:16.722298 kernel: BTRFS info (device vda6): using free space tree May 13 00:38:16.722309 kernel: BTRFS info (device vda6): has skinny extents May 13 00:38:16.726406 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:38:16.727225 systemd[1]: Starting ignition-files.service... May 13 00:38:16.741716 ignition[835]: INFO : Ignition 2.14.0 May 13 00:38:16.741716 ignition[835]: INFO : Stage: files May 13 00:38:16.743785 ignition[835]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:38:16.743785 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:38:16.743785 ignition[835]: DEBUG : files: compiled without relabeling support, skipping May 13 00:38:16.747505 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:38:16.747505 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:38:16.747505 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:38:16.747505 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:38:16.747505 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:38:16.747505 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 00:38:16.747505 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 13 00:38:16.745978 unknown[835]: wrote ssh authorized keys file for user: core May 13 00:38:16.796001 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 00:38:16.948153 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 00:38:16.948153 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:38:16.952275 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 13 00:38:17.425728 systemd-networkd[719]: eth0: Gained IPv6LL May 13 00:38:17.432014 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 00:38:17.779013 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 00:38:17.779013 ignition[835]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:38:17.783386 ignition[835]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:38:17.805314 ignition[835]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:38:17.805314 ignition[835]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:38:17.805314 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:38:17.805314 ignition[835]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:38:17.805314 ignition[835]: INFO : files: files passed May 13 00:38:17.805314 ignition[835]: INFO : Ignition finished successfully May 13 00:38:17.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.803673 systemd[1]: Finished ignition-files.service. May 13 00:38:17.806035 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:38:17.807842 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:38:17.822632 initrd-setup-root-after-ignition[861]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:38:17.808375 systemd[1]: Starting ignition-quench.service... May 13 00:38:17.825047 initrd-setup-root-after-ignition[863]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:38:17.810878 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:38:17.810941 systemd[1]: Finished ignition-quench.service. May 13 00:38:17.813447 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:38:17.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.815427 systemd[1]: Reached target ignition-complete.target. May 13 00:38:17.817470 systemd[1]: Starting initrd-parse-etc.service... May 13 00:38:17.828747 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:38:17.828813 systemd[1]: Finished initrd-parse-etc.service. May 13 00:38:17.830450 systemd[1]: Reached target initrd-fs.target. May 13 00:38:17.830498 systemd[1]: Reached target initrd.target. May 13 00:38:17.830874 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:38:17.831465 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:38:17.840298 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:38:17.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.841686 systemd[1]: Starting initrd-cleanup.service... May 13 00:38:17.848780 systemd[1]: Stopped target nss-lookup.target. May 13 00:38:17.849660 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:38:17.851260 systemd[1]: Stopped target timers.target. May 13 00:38:17.852853 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:38:17.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.852937 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:38:17.854439 systemd[1]: Stopped target initrd.target. May 13 00:38:17.856090 systemd[1]: Stopped target basic.target. May 13 00:38:17.857636 systemd[1]: Stopped target ignition-complete.target. May 13 00:38:17.859200 systemd[1]: Stopped target ignition-diskful.target. May 13 00:38:17.860773 systemd[1]: Stopped target initrd-root-device.target. May 13 00:38:17.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.862481 systemd[1]: Stopped target remote-fs.target. May 13 00:38:17.887265 ignition[876]: INFO : Ignition 2.14.0 May 13 00:38:17.887265 ignition[876]: INFO : Stage: umount May 13 00:38:17.887265 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:38:17.887265 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:38:17.887265 ignition[876]: INFO : umount: umount passed May 13 00:38:17.887265 ignition[876]: INFO : Ignition finished successfully May 13 00:38:17.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.864189 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:38:17.865100 systemd[1]: Stopped target sysinit.target. May 13 00:38:17.865224 systemd[1]: Stopped target local-fs.target. May 13 00:38:17.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.865392 systemd[1]: Stopped target local-fs-pre.target. May 13 00:38:17.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.923000 audit: BPF prog-id=6 op=UNLOAD May 13 00:38:17.865576 systemd[1]: Stopped target swap.target. May 13 00:38:17.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.865712 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:38:17.865793 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:38:17.865960 systemd[1]: Stopped target cryptsetup.target. May 13 00:38:17.866050 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:38:17.866147 systemd[1]: Stopped dracut-initqueue.service. May 13 00:38:17.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.866272 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:38:17.866352 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:38:17.866643 systemd[1]: Stopped target paths.target. May 13 00:38:17.866716 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:38:17.870585 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:38:17.870769 systemd[1]: Stopped target slices.target. May 13 00:38:17.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.870919 systemd[1]: Stopped target sockets.target. May 13 00:38:17.871073 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:38:17.871134 systemd[1]: Closed iscsid.socket. May 13 00:38:17.871255 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:38:17.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.871315 systemd[1]: Closed iscsiuio.socket. May 13 00:38:17.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.871435 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:38:17.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.871523 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:38:17.871951 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:38:17.872030 systemd[1]: Stopped ignition-files.service. May 13 00:38:17.872834 systemd[1]: Stopping ignition-mount.service... May 13 00:38:17.873584 systemd[1]: Stopping sysroot-boot.service... May 13 00:38:17.873879 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:38:17.873992 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:38:17.874163 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:38:17.874266 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:38:17.876866 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:38:17.876939 systemd[1]: Finished initrd-cleanup.service. May 13 00:38:17.879687 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:38:17.879750 systemd[1]: Stopped ignition-mount.service. May 13 00:38:17.879909 systemd[1]: Stopped target network.target. May 13 00:38:17.880031 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:38:17.880061 systemd[1]: Stopped ignition-disks.service. May 13 00:38:17.880218 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:38:17.880243 systemd[1]: Stopped ignition-kargs.service. May 13 00:38:17.880394 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:38:17.880421 systemd[1]: Stopped ignition-setup.service. May 13 00:38:17.880663 systemd[1]: Stopping systemd-networkd.service... May 13 00:38:17.880793 systemd[1]: Stopping systemd-resolved.service... May 13 00:38:17.885297 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:38:17.891658 systemd-networkd[719]: eth0: DHCPv6 lease lost May 13 00:38:17.974000 audit: BPF prog-id=9 op=UNLOAD May 13 00:38:17.900950 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:38:17.901023 systemd[1]: Stopped systemd-resolved.service. May 13 00:38:17.904684 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:38:17.904753 systemd[1]: Stopped systemd-networkd.service. May 13 00:38:17.920051 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:38:17.920074 systemd[1]: Closed systemd-networkd.socket. May 13 00:38:17.920695 systemd[1]: Stopping network-cleanup.service... May 13 00:38:17.920873 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:38:17.920907 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:38:17.921077 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:38:17.921102 systemd[1]: Stopped systemd-sysctl.service. May 13 00:38:17.924209 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:38:17.924240 systemd[1]: Stopped systemd-modules-load.service. May 13 00:38:17.925926 systemd[1]: Stopping systemd-udevd.service... May 13 00:38:17.927443 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:38:17.929925 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:38:17.929988 systemd[1]: Stopped network-cleanup.service. May 13 00:38:17.937486 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:38:17.937615 systemd[1]: Stopped systemd-udevd.service. May 13 00:38:17.939148 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:38:17.939174 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:38:17.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.940838 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:38:17.940888 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:38:17.942716 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:38:17.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:17.942748 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:38:17.944242 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:38:17.944269 systemd[1]: Stopped dracut-cmdline.service. May 13 00:38:17.945927 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:38:17.945954 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:38:17.946540 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:38:17.946829 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 13 00:38:17.946862 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 13 00:38:17.948498 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:38:17.948536 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:38:17.950063 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:38:17.950093 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:38:17.951728 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 13 00:38:17.952029 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:38:17.952088 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:38:17.993918 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:38:17.993983 systemd[1]: Stopped sysroot-boot.service. May 13 00:38:17.995481 systemd[1]: Reached target initrd-switch-root.target. May 13 00:38:17.997351 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:38:17.997383 systemd[1]: Stopped initrd-setup-root.service. May 13 00:38:17.999534 systemd[1]: Starting initrd-switch-root.service... May 13 00:38:18.015690 systemd[1]: Switching root. May 13 00:38:18.039359 iscsid[725]: iscsid shutting down. May 13 00:38:18.040186 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 13 00:38:18.040226 systemd-journald[198]: Journal stopped May 13 00:38:20.710940 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:38:20.711001 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:38:20.711017 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:38:20.711030 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:38:20.711044 kernel: SELinux: policy capability open_perms=1 May 13 00:38:20.711057 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:38:20.711072 kernel: SELinux: policy capability always_check_network=0 May 13 00:38:20.711084 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:38:20.711095 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:38:20.711106 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:38:20.711118 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:38:20.711131 systemd[1]: Successfully loaded SELinux policy in 36.715ms. May 13 00:38:20.711150 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.221ms. May 13 00:38:20.711165 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:38:20.711178 systemd[1]: Detected virtualization kvm. May 13 00:38:20.711190 systemd[1]: Detected architecture x86-64. May 13 00:38:20.711203 systemd[1]: Detected first boot. May 13 00:38:20.711216 systemd[1]: Initializing machine ID from VM UUID. May 13 00:38:20.711228 kernel: kauditd_printk_skb: 65 callbacks suppressed May 13 00:38:20.711243 kernel: audit: type=1400 audit(1747096698.358:76): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:38:20.711260 kernel: audit: type=1400 audit(1747096698.358:77): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:38:20.711272 kernel: audit: type=1334 audit(1747096698.359:78): prog-id=10 op=LOAD May 13 00:38:20.711284 kernel: audit: type=1334 audit(1747096698.359:79): prog-id=10 op=UNLOAD May 13 00:38:20.711296 kernel: audit: type=1334 audit(1747096698.365:80): prog-id=11 op=LOAD May 13 00:38:20.711308 kernel: audit: type=1334 audit(1747096698.365:81): prog-id=11 op=UNLOAD May 13 00:38:20.711320 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:38:20.711333 kernel: audit: type=1400 audit(1747096698.396:82): avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:38:20.711346 kernel: audit: type=1300 audit(1747096698.396:82): arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:20.711359 kernel: audit: type=1327 audit(1747096698.396:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:38:20.711372 kernel: audit: type=1400 audit(1747096698.398:83): avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:38:20.711384 systemd[1]: Populated /etc with preset unit settings. May 13 00:38:20.711398 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:38:20.711411 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:38:20.711426 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:38:20.711439 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:38:20.711460 systemd[1]: Stopped iscsiuio.service. May 13 00:38:20.711472 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:38:20.711487 systemd[1]: Stopped iscsid.service. May 13 00:38:20.711499 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:38:20.711513 systemd[1]: Stopped initrd-switch-root.service. May 13 00:38:20.711526 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:38:20.711539 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:38:20.711563 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:38:20.711576 systemd[1]: Created slice system-getty.slice. May 13 00:38:20.711588 systemd[1]: Created slice system-modprobe.slice. May 13 00:38:20.711604 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:38:20.711618 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:38:20.711631 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:38:20.711643 systemd[1]: Created slice user.slice. May 13 00:38:20.711656 systemd[1]: Started systemd-ask-password-console.path. May 13 00:38:20.711668 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:38:20.711681 systemd[1]: Set up automount boot.automount. May 13 00:38:20.711693 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:38:20.711706 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:38:20.711718 systemd[1]: Stopped target initrd-fs.target. May 13 00:38:20.711732 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:38:20.711744 systemd[1]: Reached target integritysetup.target. May 13 00:38:20.711757 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:38:20.711769 systemd[1]: Reached target remote-fs.target. May 13 00:38:20.711782 systemd[1]: Reached target slices.target. May 13 00:38:20.711795 systemd[1]: Reached target swap.target. May 13 00:38:20.711806 systemd[1]: Reached target torcx.target. May 13 00:38:20.711819 systemd[1]: Reached target veritysetup.target. May 13 00:38:20.711831 systemd[1]: Listening on systemd-coredump.socket. May 13 00:38:20.711845 systemd[1]: Listening on systemd-initctl.socket. May 13 00:38:20.711858 systemd[1]: Listening on systemd-networkd.socket. May 13 00:38:20.711870 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:38:20.711883 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:38:20.711896 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:38:20.711910 systemd[1]: Mounting dev-hugepages.mount... May 13 00:38:20.711923 systemd[1]: Mounting dev-mqueue.mount... May 13 00:38:20.711936 systemd[1]: Mounting media.mount... May 13 00:38:20.711950 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:20.711964 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:38:20.711981 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:38:20.711995 systemd[1]: Mounting tmp.mount... May 13 00:38:20.712009 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:38:20.712020 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:38:20.712030 systemd[1]: Starting kmod-static-nodes.service... May 13 00:38:20.712040 systemd[1]: Starting modprobe@configfs.service... May 13 00:38:20.712050 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:38:20.712061 systemd[1]: Starting modprobe@drm.service... May 13 00:38:20.712071 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:38:20.712083 systemd[1]: Starting modprobe@fuse.service... May 13 00:38:20.712093 systemd[1]: Starting modprobe@loop.service... May 13 00:38:20.712104 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:38:20.712114 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:38:20.712124 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:38:20.712134 kernel: loop: module loaded May 13 00:38:20.712144 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:38:20.712154 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:38:20.712164 kernel: fuse: init (API version 7.34) May 13 00:38:20.712175 systemd[1]: Stopped systemd-journald.service. May 13 00:38:20.712186 systemd[1]: Starting systemd-journald.service... May 13 00:38:20.712201 systemd[1]: Starting systemd-modules-load.service... May 13 00:38:20.712214 systemd[1]: Starting systemd-network-generator.service... May 13 00:38:20.712226 systemd[1]: Starting systemd-remount-fs.service... May 13 00:38:20.712237 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:38:20.712247 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:38:20.712256 systemd[1]: Stopped verity-setup.service. May 13 00:38:20.712267 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:20.712281 systemd-journald[999]: Journal started May 13 00:38:20.712321 systemd-journald[999]: Runtime Journal (/run/log/journal/2da543d51e9041cf8c2951fe163f95a3) is 6.0M, max 48.5M, 42.5M free. May 13 00:38:18.095000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:38:18.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:38:18.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:38:18.359000 audit: BPF prog-id=10 op=LOAD May 13 00:38:18.359000 audit: BPF prog-id=10 op=UNLOAD May 13 00:38:18.365000 audit: BPF prog-id=11 op=LOAD May 13 00:38:18.365000 audit: BPF prog-id=11 op=UNLOAD May 13 00:38:18.396000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:38:18.396000 audit[909]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:18.396000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:38:18.398000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:38:18.398000 audit[909]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a9 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:18.398000 audit: CWD cwd="/" May 13 00:38:18.398000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:18.398000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:18.398000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:38:20.461000 audit: BPF prog-id=12 op=LOAD May 13 00:38:20.461000 audit: BPF prog-id=3 op=UNLOAD May 13 00:38:20.461000 audit: BPF prog-id=13 op=LOAD May 13 00:38:20.461000 audit: BPF prog-id=14 op=LOAD May 13 00:38:20.461000 audit: BPF prog-id=4 op=UNLOAD May 13 00:38:20.461000 audit: BPF prog-id=5 op=UNLOAD May 13 00:38:20.462000 audit: BPF prog-id=15 op=LOAD May 13 00:38:20.462000 audit: BPF prog-id=12 op=UNLOAD May 13 00:38:20.462000 audit: BPF prog-id=16 op=LOAD May 13 00:38:20.462000 audit: BPF prog-id=17 op=LOAD May 13 00:38:20.462000 audit: BPF prog-id=13 op=UNLOAD May 13 00:38:20.462000 audit: BPF prog-id=14 op=UNLOAD May 13 00:38:20.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.476000 audit: BPF prog-id=15 op=UNLOAD May 13 00:38:20.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.671000 audit: BPF prog-id=18 op=LOAD May 13 00:38:20.671000 audit: BPF prog-id=19 op=LOAD May 13 00:38:20.671000 audit: BPF prog-id=20 op=LOAD May 13 00:38:20.671000 audit: BPF prog-id=16 op=UNLOAD May 13 00:38:20.672000 audit: BPF prog-id=17 op=UNLOAD May 13 00:38:20.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.709000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:38:20.709000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fffa7860f90 a2=4000 a3=7fffa786102c items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:20.709000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:38:20.460139 systemd[1]: Queued start job for default target multi-user.target. May 13 00:38:18.395776 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:38:20.460150 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:38:18.395986 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:38:20.717106 systemd[1]: Started systemd-journald.service. May 13 00:38:20.463800 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:38:20.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:18.396002 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:38:18.396034 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:38:20.717321 systemd[1]: Mounted dev-hugepages.mount. May 13 00:38:18.396043 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:38:20.718243 systemd[1]: Mounted dev-mqueue.mount. May 13 00:38:18.396066 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:38:20.719132 systemd[1]: Mounted media.mount. May 13 00:38:18.396076 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:38:20.719951 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:38:18.396239 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:38:20.720860 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:38:18.396269 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:38:20.721737 systemd[1]: Mounted tmp.mount. May 13 00:38:18.396280 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:38:20.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.722642 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:38:18.396734 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:38:18.396767 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:38:18.396782 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:38:18.396794 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:38:18.396807 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:38:18.396819 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:38:20.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.733817 systemd[1]: Finished kmod-static-nodes.service. May 13 00:38:20.179524 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:38:20.179776 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:38:20.179865 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:38:20.180012 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:38:20.180058 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:38:20.180116 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-13T00:38:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:38:20.735124 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:38:20.735313 systemd[1]: Finished modprobe@configfs.service. May 13 00:38:20.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.736481 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:38:20.736659 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:38:20.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.737748 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:38:20.737929 systemd[1]: Finished modprobe@drm.service. May 13 00:38:20.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.738976 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:38:20.739175 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:38:20.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.740271 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:38:20.740405 systemd[1]: Finished modprobe@fuse.service. May 13 00:38:20.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.741435 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:38:20.741595 systemd[1]: Finished modprobe@loop.service. May 13 00:38:20.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.742723 systemd[1]: Finished systemd-modules-load.service. May 13 00:38:20.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.754025 systemd[1]: Finished systemd-network-generator.service. May 13 00:38:20.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.755169 systemd[1]: Finished systemd-remount-fs.service. May 13 00:38:20.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.756201 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:38:20.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.757524 systemd[1]: Reached target network-pre.target. May 13 00:38:20.759265 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:38:20.760861 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:38:20.761601 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:38:20.762705 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:38:20.764170 systemd[1]: Starting systemd-journal-flush.service... May 13 00:38:20.765052 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:38:20.765733 systemd[1]: Starting systemd-random-seed.service... May 13 00:38:20.766543 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:38:20.767471 systemd[1]: Starting systemd-sysctl.service... May 13 00:38:20.768272 systemd-journald[999]: Time spent on flushing to /var/log/journal/2da543d51e9041cf8c2951fe163f95a3 is 13.108ms for 1103 entries. May 13 00:38:20.768272 systemd-journald[999]: System Journal (/var/log/journal/2da543d51e9041cf8c2951fe163f95a3) is 8.0M, max 195.6M, 187.6M free. May 13 00:38:20.890831 systemd-journald[999]: Received client request to flush runtime journal. May 13 00:38:20.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:20.770640 systemd[1]: Starting systemd-sysusers.service... May 13 00:38:20.772326 systemd[1]: Starting systemd-udev-settle.service... May 13 00:38:20.891654 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:38:20.774702 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:38:20.779686 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:38:20.792116 systemd[1]: Finished systemd-sysctl.service. May 13 00:38:20.797964 systemd[1]: Finished systemd-sysusers.service. May 13 00:38:20.799653 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:38:20.845169 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:38:20.862309 systemd[1]: Finished systemd-random-seed.service. May 13 00:38:20.863343 systemd[1]: Reached target first-boot-complete.target. May 13 00:38:20.891773 systemd[1]: Finished systemd-journal-flush.service. May 13 00:38:20.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.252979 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:38:21.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.254000 audit: BPF prog-id=21 op=LOAD May 13 00:38:21.254000 audit: BPF prog-id=22 op=LOAD May 13 00:38:21.254000 audit: BPF prog-id=7 op=UNLOAD May 13 00:38:21.254000 audit: BPF prog-id=8 op=UNLOAD May 13 00:38:21.255786 systemd[1]: Starting systemd-udevd.service... May 13 00:38:21.276923 systemd-udevd[1019]: Using default interface naming scheme 'v252'. May 13 00:38:21.289993 systemd[1]: Started systemd-udevd.service. May 13 00:38:21.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.291000 audit: BPF prog-id=23 op=LOAD May 13 00:38:21.295715 systemd[1]: Starting systemd-networkd.service... May 13 00:38:21.298000 audit: BPF prog-id=24 op=LOAD May 13 00:38:21.299000 audit: BPF prog-id=25 op=LOAD May 13 00:38:21.299000 audit: BPF prog-id=26 op=LOAD May 13 00:38:21.300314 systemd[1]: Starting systemd-userdbd.service... May 13 00:38:21.323517 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 00:38:21.325589 systemd[1]: Started systemd-userdbd.service. May 13 00:38:21.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.341882 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:38:21.356574 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 00:38:21.360589 kernel: ACPI: button: Power Button [PWRF] May 13 00:38:21.366519 systemd-networkd[1032]: lo: Link UP May 13 00:38:21.366527 systemd-networkd[1032]: lo: Gained carrier May 13 00:38:21.367052 systemd-networkd[1032]: Enumeration completed May 13 00:38:21.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.367150 systemd[1]: Started systemd-networkd.service. May 13 00:38:21.367338 systemd-networkd[1032]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:38:21.368616 systemd-networkd[1032]: eth0: Link UP May 13 00:38:21.368620 systemd-networkd[1032]: eth0: Gained carrier May 13 00:38:21.379904 systemd-networkd[1032]: eth0: DHCPv4 address 10.0.0.18/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:38:21.377000 audit[1045]: AVC avc: denied { confidentiality } for pid=1045 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 00:38:21.377000 audit[1045]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562f7459ed80 a1=338ac a2=7fa5db036bc5 a3=5 items=110 ppid=1019 pid=1045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:21.377000 audit: CWD cwd="/" May 13 00:38:21.377000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=1 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=2 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=3 name=(null) inode=13724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=4 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=5 name=(null) inode=13725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=6 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=7 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=8 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=9 name=(null) inode=13727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=10 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=11 name=(null) inode=13728 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=12 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=13 name=(null) inode=13729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=14 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=15 name=(null) inode=13730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=16 name=(null) inode=13726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=17 name=(null) inode=13731 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=18 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=19 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=20 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=21 name=(null) inode=13733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=22 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=23 name=(null) inode=13734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=24 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=25 name=(null) inode=13735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=26 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=27 name=(null) inode=13736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=28 name=(null) inode=13732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=29 name=(null) inode=13737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=30 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=31 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=32 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=33 name=(null) inode=13739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=34 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=35 name=(null) inode=13740 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=36 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=37 name=(null) inode=13741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=38 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=39 name=(null) inode=13742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=40 name=(null) inode=13738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=41 name=(null) inode=13743 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=42 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=43 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=44 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=45 name=(null) inode=13745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=46 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=47 name=(null) inode=13746 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=48 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=49 name=(null) inode=13747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=50 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=51 name=(null) inode=13748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=52 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=53 name=(null) inode=13749 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=55 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=56 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=57 name=(null) inode=13751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=58 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=59 name=(null) inode=13752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=60 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=61 name=(null) inode=13753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=62 name=(null) inode=13753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=63 name=(null) inode=13754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=64 name=(null) inode=13753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=65 name=(null) inode=13755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=66 name=(null) inode=13753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=67 name=(null) inode=13756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=68 name=(null) inode=13753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=69 name=(null) inode=13757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=70 name=(null) inode=13753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=71 name=(null) inode=13758 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=72 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=73 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=74 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=75 name=(null) inode=13760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=76 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=77 name=(null) inode=13761 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=78 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=79 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=80 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=81 name=(null) inode=13763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=82 name=(null) inode=13759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=83 name=(null) inode=13764 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=84 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=85 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=86 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=87 name=(null) inode=13766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=88 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=89 name=(null) inode=13767 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=90 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=91 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=92 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=93 name=(null) inode=13769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=94 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=95 name=(null) inode=13770 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=96 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=97 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=98 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=99 name=(null) inode=13772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=100 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=101 name=(null) inode=13773 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=102 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=103 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=104 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=105 name=(null) inode=13775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=106 name=(null) inode=13771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=107 name=(null) inode=13776 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PATH item=109 name=(null) inode=13777 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:38:21.377000 audit: PROCTITLE proctitle="(udev-worker)" May 13 00:38:21.390615 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 00:38:21.400580 kernel: mousedev: PS/2 mouse device common for all mice May 13 00:38:21.409566 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 13 00:38:21.411741 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 13 00:38:21.411896 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 13 00:38:21.460148 kernel: kvm: Nested Virtualization enabled May 13 00:38:21.460238 kernel: SVM: kvm: Nested Paging enabled May 13 00:38:21.460253 kernel: SVM: Virtual VMLOAD VMSAVE supported May 13 00:38:21.460819 kernel: SVM: Virtual GIF supported May 13 00:38:21.477576 kernel: EDAC MC: Ver: 3.0.0 May 13 00:38:21.501971 systemd[1]: Finished systemd-udev-settle.service. May 13 00:38:21.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.504148 systemd[1]: Starting lvm2-activation-early.service... May 13 00:38:21.511177 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:38:21.538713 systemd[1]: Finished lvm2-activation-early.service. May 13 00:38:21.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.539884 systemd[1]: Reached target cryptsetup.target. May 13 00:38:21.541784 systemd[1]: Starting lvm2-activation.service... May 13 00:38:21.545294 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:38:21.569524 systemd[1]: Finished lvm2-activation.service. May 13 00:38:21.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.570589 systemd[1]: Reached target local-fs-pre.target. May 13 00:38:21.571518 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:38:21.571540 systemd[1]: Reached target local-fs.target. May 13 00:38:21.572387 systemd[1]: Reached target machines.target. May 13 00:38:21.574326 systemd[1]: Starting ldconfig.service... May 13 00:38:21.575353 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:38:21.575388 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:38:21.576222 systemd[1]: Starting systemd-boot-update.service... May 13 00:38:21.578056 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:38:21.580333 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:38:21.582348 systemd[1]: Starting systemd-sysext.service... May 13 00:38:21.583523 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) May 13 00:38:21.584675 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:38:21.589250 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:38:21.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.597699 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:38:21.601116 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:38:21.601323 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:38:21.736588 kernel: loop0: detected capacity change from 0 to 205544 May 13 00:38:21.739173 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:38:21.739753 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:38:21.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.746579 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:38:21.747658 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) May 13 00:38:21.747658 systemd-fsck[1065]: /dev/vda1: 790 files, 120692/258078 clusters May 13 00:38:21.750093 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:38:21.752756 systemd[1]: Mounting boot.mount... May 13 00:38:21.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.758926 systemd[1]: Mounted boot.mount. May 13 00:38:21.764574 kernel: loop1: detected capacity change from 0 to 205544 May 13 00:38:21.766590 (sd-sysext)[1071]: Using extensions 'kubernetes'. May 13 00:38:21.767596 (sd-sysext)[1071]: Merged extensions into '/usr'. May 13 00:38:21.770089 systemd[1]: Finished systemd-boot-update.service. May 13 00:38:21.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.782204 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:21.783418 systemd[1]: Mounting usr-share-oem.mount... May 13 00:38:21.784458 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:38:21.785425 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:38:21.787820 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:38:21.789965 systemd[1]: Starting modprobe@loop.service... May 13 00:38:21.790789 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:38:21.790888 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:38:21.790988 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:21.793237 systemd[1]: Mounted usr-share-oem.mount. May 13 00:38:21.794294 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:38:21.794396 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:38:21.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.795682 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:38:21.795780 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:38:21.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.797059 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:38:21.797155 systemd[1]: Finished modprobe@loop.service. May 13 00:38:21.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.798439 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:38:21.798528 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:38:21.799346 systemd[1]: Finished systemd-sysext.service. May 13 00:38:21.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.801151 systemd[1]: Starting ensure-sysext.service... May 13 00:38:21.802881 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:38:21.807955 systemd[1]: Reloading. May 13 00:38:21.816291 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:38:21.817458 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:38:21.819008 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:38:21.835590 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:38:21.866137 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-05-13T00:38:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:38:21.866462 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-05-13T00:38:21Z" level=info msg="torcx already run" May 13 00:38:21.921157 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:38:21.921174 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:38:21.937764 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:38:21.987000 audit: BPF prog-id=27 op=LOAD May 13 00:38:21.987000 audit: BPF prog-id=24 op=UNLOAD May 13 00:38:21.987000 audit: BPF prog-id=28 op=LOAD May 13 00:38:21.987000 audit: BPF prog-id=29 op=LOAD May 13 00:38:21.987000 audit: BPF prog-id=25 op=UNLOAD May 13 00:38:21.987000 audit: BPF prog-id=26 op=UNLOAD May 13 00:38:21.989000 audit: BPF prog-id=30 op=LOAD May 13 00:38:21.989000 audit: BPF prog-id=23 op=UNLOAD May 13 00:38:21.989000 audit: BPF prog-id=31 op=LOAD May 13 00:38:21.990000 audit: BPF prog-id=18 op=UNLOAD May 13 00:38:21.990000 audit: BPF prog-id=32 op=LOAD May 13 00:38:21.990000 audit: BPF prog-id=33 op=LOAD May 13 00:38:21.990000 audit: BPF prog-id=19 op=UNLOAD May 13 00:38:21.990000 audit: BPF prog-id=20 op=UNLOAD May 13 00:38:21.990000 audit: BPF prog-id=34 op=LOAD May 13 00:38:21.990000 audit: BPF prog-id=35 op=LOAD May 13 00:38:21.990000 audit: BPF prog-id=21 op=UNLOAD May 13 00:38:21.990000 audit: BPF prog-id=22 op=UNLOAD May 13 00:38:21.993581 systemd[1]: Finished ldconfig.service. May 13 00:38:21.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.995791 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:38:21.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:21.999269 systemd[1]: Starting audit-rules.service... May 13 00:38:22.001204 systemd[1]: Starting clean-ca-certificates.service... May 13 00:38:22.003403 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:38:22.004000 audit: BPF prog-id=36 op=LOAD May 13 00:38:22.005840 systemd[1]: Starting systemd-resolved.service... May 13 00:38:22.006000 audit: BPF prog-id=37 op=LOAD May 13 00:38:22.007941 systemd[1]: Starting systemd-timesyncd.service... May 13 00:38:22.010058 systemd[1]: Starting systemd-update-utmp.service... May 13 00:38:22.011534 systemd[1]: Finished clean-ca-certificates.service. May 13 00:38:22.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.014290 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:38:22.014000 audit[1151]: SYSTEM_BOOT pid=1151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:38:22.018238 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:22.018461 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:38:22.019797 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:38:22.021513 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:38:22.023372 systemd[1]: Starting modprobe@loop.service... May 13 00:38:22.024139 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:38:22.024240 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:38:22.024345 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:38:22.024407 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:22.025304 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:38:22.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.026795 systemd[1]: Finished systemd-update-utmp.service. May 13 00:38:22.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.028138 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:38:22.028241 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:38:22.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:22.029511 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:38:22.029649 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:38:22.030980 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:38:22.031092 systemd[1]: Finished modprobe@loop.service. May 13 00:38:22.033260 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:38:22.033345 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:38:22.034613 systemd[1]: Starting systemd-update-done.service... May 13 00:38:22.037656 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:22.037822 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:38:22.038867 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:38:22.041068 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:38:22.042000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:38:22.042000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff38884710 a2=420 a3=0 items=0 ppid=1140 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:22.042000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:38:22.043158 systemd[1]: Starting modprobe@loop.service... May 13 00:38:22.043289 augenrules[1166]: No rules May 13 00:38:22.044025 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:38:22.044119 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:38:22.044201 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:38:22.044261 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:22.045060 systemd[1]: Finished systemd-update-done.service. May 13 00:38:22.046345 systemd[1]: Finished audit-rules.service. May 13 00:38:22.047503 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:38:22.047620 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:38:22.048883 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:38:22.049020 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:38:22.050355 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:38:22.050509 systemd[1]: Finished modprobe@loop.service. May 13 00:38:22.051896 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:38:22.052017 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:38:22.054359 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:22.054849 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:38:22.056088 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:38:22.058244 systemd[1]: Starting modprobe@drm.service... May 13 00:38:22.060441 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:38:22.062513 systemd[1]: Starting modprobe@loop.service... May 13 00:38:22.063460 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:38:22.063569 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:38:22.063612 systemd-resolved[1146]: Positive Trust Anchors: May 13 00:38:22.063619 systemd-resolved[1146]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:38:22.063644 systemd-resolved[1146]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:38:22.064603 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:38:22.065896 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:38:22.066013 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:38:22.067045 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:38:22.067178 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:38:22.068756 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:38:22.068849 systemd[1]: Finished modprobe@drm.service. May 13 00:38:22.070028 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:38:22.070117 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:38:22.071214 systemd-resolved[1146]: Defaulting to hostname 'linux'. May 13 00:38:23.183916 systemd-timesyncd[1150]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:38:23.183957 systemd[1]: Started systemd-timesyncd.service. May 13 00:38:23.183963 systemd-timesyncd[1150]: Initial clock synchronization to Tue 2025-05-13 00:38:23.183836 UTC. May 13 00:38:23.185278 systemd[1]: Started systemd-resolved.service. May 13 00:38:23.186544 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:38:23.186649 systemd[1]: Finished modprobe@loop.service. May 13 00:38:23.188044 systemd[1]: Reached target network.target. May 13 00:38:23.189041 systemd[1]: Reached target nss-lookup.target. May 13 00:38:23.189957 systemd[1]: Reached target time-set.target. May 13 00:38:23.190800 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:38:23.190823 systemd[1]: Reached target sysinit.target. May 13 00:38:23.191723 systemd[1]: Started motdgen.path. May 13 00:38:23.192534 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:38:23.193838 systemd[1]: Started logrotate.timer. May 13 00:38:23.194796 systemd[1]: Started mdadm.timer. May 13 00:38:23.195561 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:38:23.196481 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:38:23.196506 systemd[1]: Reached target paths.target. May 13 00:38:23.197321 systemd[1]: Reached target timers.target. May 13 00:38:23.198442 systemd[1]: Listening on dbus.socket. May 13 00:38:23.200082 systemd[1]: Starting docker.socket... May 13 00:38:23.203031 systemd[1]: Listening on sshd.socket. May 13 00:38:23.203948 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:38:23.203993 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:38:23.204491 systemd[1]: Finished ensure-sysext.service. May 13 00:38:23.205500 systemd[1]: Listening on docker.socket. May 13 00:38:23.207090 systemd[1]: Reached target sockets.target. May 13 00:38:23.207932 systemd[1]: Reached target basic.target. May 13 00:38:23.208754 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:38:23.208783 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:38:23.209603 systemd[1]: Starting containerd.service... May 13 00:38:23.211276 systemd[1]: Starting dbus.service... May 13 00:38:23.212932 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:38:23.214738 systemd[1]: Starting extend-filesystems.service... May 13 00:38:23.215735 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:38:23.216691 jq[1182]: false May 13 00:38:23.216637 systemd[1]: Starting motdgen.service... May 13 00:38:23.218377 systemd[1]: Starting prepare-helm.service... May 13 00:38:23.220433 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:38:23.222307 systemd[1]: Starting sshd-keygen.service... May 13 00:38:23.225317 systemd[1]: Starting systemd-logind.service... May 13 00:38:23.226434 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:38:23.226474 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:38:23.226826 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:38:23.228048 systemd[1]: Starting update-engine.service... May 13 00:38:23.229752 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:38:23.232092 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:38:23.232243 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:38:23.233274 jq[1200]: true May 13 00:38:23.233279 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:38:23.233423 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:38:23.238819 jq[1203]: true May 13 00:38:23.239431 extend-filesystems[1183]: Found loop1 May 13 00:38:23.239431 extend-filesystems[1183]: Found sr0 May 13 00:38:23.239431 extend-filesystems[1183]: Found vda May 13 00:38:23.239431 extend-filesystems[1183]: Found vda1 May 13 00:38:23.244065 tar[1202]: linux-amd64/helm May 13 00:38:23.250461 extend-filesystems[1183]: Found vda2 May 13 00:38:23.251271 extend-filesystems[1183]: Found vda3 May 13 00:38:23.251271 extend-filesystems[1183]: Found usr May 13 00:38:23.251271 extend-filesystems[1183]: Found vda4 May 13 00:38:23.251271 extend-filesystems[1183]: Found vda6 May 13 00:38:23.251271 extend-filesystems[1183]: Found vda7 May 13 00:38:23.251271 extend-filesystems[1183]: Found vda9 May 13 00:38:23.256104 extend-filesystems[1183]: Checking size of /dev/vda9 May 13 00:38:23.255163 dbus-daemon[1181]: [system] SELinux support is enabled May 13 00:38:23.256117 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:38:23.257303 systemd[1]: Finished motdgen.service. May 13 00:38:23.258393 systemd[1]: Started dbus.service. May 13 00:38:23.260186 env[1204]: time="2025-05-13T00:38:23.260142535Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:38:23.262610 update_engine[1199]: I0513 00:38:23.262451 1199 main.cc:92] Flatcar Update Engine starting May 13 00:38:23.265068 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:38:23.265101 systemd[1]: Reached target system-config.target. May 13 00:38:23.266298 update_engine[1199]: I0513 00:38:23.266258 1199 update_check_scheduler.cc:74] Next update check in 5m52s May 13 00:38:23.266302 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:38:23.266315 systemd[1]: Reached target user-config.target. May 13 00:38:23.268150 systemd[1]: Started update-engine.service. May 13 00:38:23.270514 systemd[1]: Started locksmithd.service. May 13 00:38:23.281492 extend-filesystems[1183]: Resized partition /dev/vda9 May 13 00:38:23.284433 systemd-logind[1194]: Watching system buttons on /dev/input/event1 (Power Button) May 13 00:38:23.284745 extend-filesystems[1236]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:38:23.285064 systemd-logind[1194]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 00:38:23.286222 systemd-logind[1194]: New seat seat0. May 13 00:38:23.287241 systemd[1]: Started systemd-logind.service. May 13 00:38:23.288928 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:38:23.306856 env[1204]: time="2025-05-13T00:38:23.306288835Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:38:23.306856 env[1204]: time="2025-05-13T00:38:23.306444818Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:38:23.309083 env[1204]: time="2025-05-13T00:38:23.308965187Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:38:23.309083 env[1204]: time="2025-05-13T00:38:23.309007276Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:38:23.310226 env[1204]: time="2025-05-13T00:38:23.310178974Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:38:23.310226 env[1204]: time="2025-05-13T00:38:23.310215703Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:38:23.310300 env[1204]: time="2025-05-13T00:38:23.310231202Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:38:23.310300 env[1204]: time="2025-05-13T00:38:23.310240700Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:38:23.310341 env[1204]: time="2025-05-13T00:38:23.310309179Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:38:23.310521 env[1204]: time="2025-05-13T00:38:23.310501880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:38:23.310658 env[1204]: time="2025-05-13T00:38:23.310634589Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:38:23.310658 env[1204]: time="2025-05-13T00:38:23.310653525Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:38:23.310920 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:38:23.333523 locksmithd[1227]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:38:23.337452 env[1204]: time="2025-05-13T00:38:23.337230435Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:38:23.337452 env[1204]: time="2025-05-13T00:38:23.337262154Z" level=info msg="metadata content store policy set" policy=shared May 13 00:38:23.337962 extend-filesystems[1236]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:38:23.337962 extend-filesystems[1236]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:38:23.337962 extend-filesystems[1236]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:38:23.342938 extend-filesystems[1183]: Resized filesystem in /dev/vda9 May 13 00:38:23.340256 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:38:23.340455 systemd[1]: Finished extend-filesystems.service. May 13 00:38:23.344776 bash[1233]: Updated "/home/core/.ssh/authorized_keys" May 13 00:38:23.345353 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:38:23.348116 env[1204]: time="2025-05-13T00:38:23.348063732Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:38:23.348164 env[1204]: time="2025-05-13T00:38:23.348122934Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:38:23.348164 env[1204]: time="2025-05-13T00:38:23.348136098Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:38:23.348204 env[1204]: time="2025-05-13T00:38:23.348174611Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348204 env[1204]: time="2025-05-13T00:38:23.348188717Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348204 env[1204]: time="2025-05-13T00:38:23.348201271Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348321 env[1204]: time="2025-05-13T00:38:23.348213193Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348321 env[1204]: time="2025-05-13T00:38:23.348227149Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348321 env[1204]: time="2025-05-13T00:38:23.348240043Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348321 env[1204]: time="2025-05-13T00:38:23.348254270Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348321 env[1204]: time="2025-05-13T00:38:23.348265842Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348321 env[1204]: time="2025-05-13T00:38:23.348278886Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:38:23.348461 env[1204]: time="2025-05-13T00:38:23.348416084Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:38:23.348489 env[1204]: time="2025-05-13T00:38:23.348483240Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:38:23.348859 env[1204]: time="2025-05-13T00:38:23.348815002Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:38:23.348886 env[1204]: time="2025-05-13T00:38:23.348869825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:38:23.348928 env[1204]: time="2025-05-13T00:38:23.348888210Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:38:23.348991 env[1204]: time="2025-05-13T00:38:23.348965795Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:38:23.348991 env[1204]: time="2025-05-13T00:38:23.348988197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349032 env[1204]: time="2025-05-13T00:38:23.349001402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349032 env[1204]: time="2025-05-13T00:38:23.349015769Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349070 env[1204]: time="2025-05-13T00:38:23.349031999Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349070 env[1204]: time="2025-05-13T00:38:23.349047468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349070 env[1204]: time="2025-05-13T00:38:23.349062176Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349130 env[1204]: time="2025-05-13T00:38:23.349075812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349130 env[1204]: time="2025-05-13T00:38:23.349094326Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:38:23.349268 env[1204]: time="2025-05-13T00:38:23.349239639Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349297 env[1204]: time="2025-05-13T00:38:23.349266499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349297 env[1204]: time="2025-05-13T00:38:23.349283381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349336 env[1204]: time="2025-05-13T00:38:23.349298580Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:38:23.349336 env[1204]: time="2025-05-13T00:38:23.349319890Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:38:23.349376 env[1204]: time="2025-05-13T00:38:23.349333866Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:38:23.349376 env[1204]: time="2025-05-13T00:38:23.349357630Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:38:23.349418 env[1204]: time="2025-05-13T00:38:23.349395361Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:38:23.349708 env[1204]: time="2025-05-13T00:38:23.349643507Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:38:23.350261 env[1204]: time="2025-05-13T00:38:23.349713478Z" level=info msg="Connect containerd service" May 13 00:38:23.350261 env[1204]: time="2025-05-13T00:38:23.349754445Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:38:23.350607 env[1204]: time="2025-05-13T00:38:23.350569935Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:38:23.350877 env[1204]: time="2025-05-13T00:38:23.350846925Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:38:23.350936 env[1204]: time="2025-05-13T00:38:23.350910534Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:38:23.352097 env[1204]: time="2025-05-13T00:38:23.350970537Z" level=info msg="containerd successfully booted in 0.091533s" May 13 00:38:23.352097 env[1204]: time="2025-05-13T00:38:23.351967958Z" level=info msg="Start subscribing containerd event" May 13 00:38:23.352097 env[1204]: time="2025-05-13T00:38:23.352013875Z" level=info msg="Start recovering state" May 13 00:38:23.352097 env[1204]: time="2025-05-13T00:38:23.352076312Z" level=info msg="Start event monitor" May 13 00:38:23.352097 env[1204]: time="2025-05-13T00:38:23.352093113Z" level=info msg="Start snapshots syncer" May 13 00:38:23.351038 systemd[1]: Started containerd.service. May 13 00:38:23.352247 env[1204]: time="2025-05-13T00:38:23.352103182Z" level=info msg="Start cni network conf syncer for default" May 13 00:38:23.352247 env[1204]: time="2025-05-13T00:38:23.352112179Z" level=info msg="Start streaming server" May 13 00:38:23.648944 tar[1202]: linux-amd64/LICENSE May 13 00:38:23.648944 tar[1202]: linux-amd64/README.md May 13 00:38:23.653642 systemd[1]: Finished prepare-helm.service. May 13 00:38:23.776953 sshd_keygen[1206]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:38:23.797039 systemd[1]: Finished sshd-keygen.service. May 13 00:38:23.799381 systemd[1]: Starting issuegen.service... May 13 00:38:23.805946 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:38:23.806063 systemd[1]: Finished issuegen.service. May 13 00:38:23.807996 systemd[1]: Starting systemd-user-sessions.service... May 13 00:38:23.813153 systemd[1]: Finished systemd-user-sessions.service. May 13 00:38:23.815302 systemd[1]: Started getty@tty1.service. May 13 00:38:23.817126 systemd[1]: Started serial-getty@ttyS0.service. May 13 00:38:23.818264 systemd[1]: Reached target getty.target. May 13 00:38:24.362084 systemd-networkd[1032]: eth0: Gained IPv6LL May 13 00:38:24.363732 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:38:24.365129 systemd[1]: Reached target network-online.target. May 13 00:38:24.367441 systemd[1]: Starting kubelet.service... May 13 00:38:24.918060 systemd[1]: Started kubelet.service. May 13 00:38:24.919189 systemd[1]: Reached target multi-user.target. May 13 00:38:24.921155 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:38:24.927750 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:38:24.927930 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:38:24.929041 systemd[1]: Startup finished in 638ms (kernel) + 4.345s (initrd) + 5.759s (userspace) = 10.744s. May 13 00:38:25.303301 kubelet[1262]: E0513 00:38:25.303244 1262 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:38:25.304806 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:38:25.304943 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:38:27.789973 systemd[1]: Created slice system-sshd.slice. May 13 00:38:27.790975 systemd[1]: Started sshd@0-10.0.0.18:22-10.0.0.1:48044.service. May 13 00:38:27.832709 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 48044 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:38:27.833994 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:38:27.842015 systemd-logind[1194]: New session 1 of user core. May 13 00:38:27.842837 systemd[1]: Created slice user-500.slice. May 13 00:38:27.843787 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:38:27.851355 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:38:27.852683 systemd[1]: Starting user@500.service... May 13 00:38:27.854939 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:38:27.918023 systemd[1274]: Queued start job for default target default.target. May 13 00:38:27.918399 systemd[1274]: Reached target paths.target. May 13 00:38:27.918418 systemd[1274]: Reached target sockets.target. May 13 00:38:27.918429 systemd[1274]: Reached target timers.target. May 13 00:38:27.918440 systemd[1274]: Reached target basic.target. May 13 00:38:27.918471 systemd[1274]: Reached target default.target. May 13 00:38:27.918494 systemd[1274]: Startup finished in 59ms. May 13 00:38:27.918543 systemd[1]: Started user@500.service. May 13 00:38:27.919394 systemd[1]: Started session-1.scope. May 13 00:38:27.969098 systemd[1]: Started sshd@1-10.0.0.18:22-10.0.0.1:48058.service. May 13 00:38:28.009207 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 48058 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:38:28.010442 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:38:28.013491 systemd-logind[1194]: New session 2 of user core. May 13 00:38:28.014543 systemd[1]: Started session-2.scope. May 13 00:38:28.065556 sshd[1283]: pam_unix(sshd:session): session closed for user core May 13 00:38:28.068633 systemd[1]: Started sshd@2-10.0.0.18:22-10.0.0.1:48060.service. May 13 00:38:28.069087 systemd[1]: sshd@1-10.0.0.18:22-10.0.0.1:48058.service: Deactivated successfully. May 13 00:38:28.069697 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:38:28.070267 systemd-logind[1194]: Session 2 logged out. Waiting for processes to exit. May 13 00:38:28.071085 systemd-logind[1194]: Removed session 2. May 13 00:38:28.106937 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 48060 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:38:28.107697 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:38:28.110419 systemd-logind[1194]: New session 3 of user core. May 13 00:38:28.111069 systemd[1]: Started session-3.scope. May 13 00:38:28.159535 sshd[1288]: pam_unix(sshd:session): session closed for user core May 13 00:38:28.162162 systemd[1]: sshd@2-10.0.0.18:22-10.0.0.1:48060.service: Deactivated successfully. May 13 00:38:28.162724 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:38:28.163289 systemd-logind[1194]: Session 3 logged out. Waiting for processes to exit. May 13 00:38:28.164092 systemd[1]: Started sshd@3-10.0.0.18:22-10.0.0.1:48066.service. May 13 00:38:28.164808 systemd-logind[1194]: Removed session 3. May 13 00:38:28.202481 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 48066 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:38:28.203384 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:38:28.206137 systemd-logind[1194]: New session 4 of user core. May 13 00:38:28.206782 systemd[1]: Started session-4.scope. May 13 00:38:28.260207 sshd[1295]: pam_unix(sshd:session): session closed for user core May 13 00:38:28.262541 systemd[1]: sshd@3-10.0.0.18:22-10.0.0.1:48066.service: Deactivated successfully. May 13 00:38:28.263000 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:38:28.263440 systemd-logind[1194]: Session 4 logged out. Waiting for processes to exit. May 13 00:38:28.264340 systemd[1]: Started sshd@4-10.0.0.18:22-10.0.0.1:48076.service. May 13 00:38:28.265054 systemd-logind[1194]: Removed session 4. May 13 00:38:28.303315 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 48076 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:38:28.304202 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:38:28.307063 systemd-logind[1194]: New session 5 of user core. May 13 00:38:28.307823 systemd[1]: Started session-5.scope. May 13 00:38:28.362396 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:38:28.362589 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:38:28.376078 dbus-daemon[1181]: Э\xca\u007f\xc5U: received setenforce notice (enforcing=-1280033184) May 13 00:38:28.377763 sudo[1304]: pam_unix(sudo:session): session closed for user root May 13 00:38:28.379182 sshd[1301]: pam_unix(sshd:session): session closed for user core May 13 00:38:28.382049 systemd[1]: sshd@4-10.0.0.18:22-10.0.0.1:48076.service: Deactivated successfully. May 13 00:38:28.382528 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:38:28.383040 systemd-logind[1194]: Session 5 logged out. Waiting for processes to exit. May 13 00:38:28.384043 systemd[1]: Started sshd@5-10.0.0.18:22-10.0.0.1:48078.service. May 13 00:38:28.384697 systemd-logind[1194]: Removed session 5. May 13 00:38:28.423890 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 48078 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:38:28.424866 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:38:28.427689 systemd-logind[1194]: New session 6 of user core. May 13 00:38:28.428392 systemd[1]: Started session-6.scope. May 13 00:38:28.478969 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:38:28.479155 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:38:28.481367 sudo[1312]: pam_unix(sudo:session): session closed for user root May 13 00:38:28.484606 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:38:28.484794 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:38:28.491547 systemd[1]: Stopping audit-rules.service... May 13 00:38:28.491000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:38:28.492590 auditctl[1315]: No rules May 13 00:38:28.492802 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:38:28.492966 systemd[1]: Stopped audit-rules.service. May 13 00:38:28.493487 kernel: kauditd_printk_skb: 235 callbacks suppressed May 13 00:38:28.493540 kernel: audit: type=1305 audit(1747096708.491:197): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:38:28.494262 systemd[1]: Starting audit-rules.service... May 13 00:38:28.491000 audit[1315]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc70b4fb90 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:28.499735 kernel: audit: type=1300 audit(1747096708.491:197): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc70b4fb90 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:28.499771 kernel: audit: type=1327 audit(1747096708.491:197): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:38:28.491000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:38:28.501059 kernel: audit: type=1131 audit(1747096708.492:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:28.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:28.514024 augenrules[1332]: No rules May 13 00:38:28.514543 systemd[1]: Finished audit-rules.service. May 13 00:38:28.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:28.515238 sudo[1311]: pam_unix(sudo:session): session closed for user root May 13 00:38:28.514000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:28.518271 sshd[1308]: pam_unix(sshd:session): session closed for user core May 13 00:38:28.519981 systemd[1]: sshd@5-10.0.0.18:22-10.0.0.1:48078.service: Deactivated successfully. May 13 00:38:28.520619 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:38:28.521129 systemd-logind[1194]: Session 6 logged out. Waiting for processes to exit. May 13 00:38:28.521741 kernel: audit: type=1130 audit(1747096708.513:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:28.522590 kernel: audit: type=1106 audit(1747096708.514:200): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:28.522623 kernel: audit: type=1104 audit(1747096708.514:201): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:28.514000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:28.521775 systemd-logind[1194]: Removed session 6. May 13 00:38:28.525207 systemd[1]: Started sshd@6-10.0.0.18:22-10.0.0.1:48080.service. May 13 00:38:28.517000 audit[1308]: USER_END pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:28.529548 kernel: audit: type=1106 audit(1747096708.517:202): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:28.529587 kernel: audit: type=1104 audit(1747096708.518:203): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:28.518000 audit[1308]: CRED_DISP pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:28.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.18:22-10.0.0.1:48078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:28.536650 kernel: audit: type=1131 audit(1747096708.519:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.18:22-10.0.0.1:48078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:28.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.18:22-10.0.0.1:48080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:28.567000 audit[1338]: USER_ACCT pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:28.568282 sshd[1338]: Accepted publickey for core from 10.0.0.1 port 48080 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:38:28.567000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:28.568000 audit[1338]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5fef93c0 a2=3 a3=0 items=0 ppid=1 pid=1338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:28.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:38:28.569191 sshd[1338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:38:28.572260 systemd-logind[1194]: New session 7 of user core. May 13 00:38:28.573168 systemd[1]: Started session-7.scope. May 13 00:38:28.575000 audit[1338]: USER_START pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:28.577000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:28.622000 audit[1341]: USER_ACCT pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:28.622000 audit[1341]: CRED_REFR pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:28.623593 sudo[1341]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:38:28.623850 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:38:28.624000 audit[1341]: USER_START pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:28.642929 systemd[1]: Starting docker.service... May 13 00:38:28.675383 env[1353]: time="2025-05-13T00:38:28.675320878Z" level=info msg="Starting up" May 13 00:38:28.676710 env[1353]: time="2025-05-13T00:38:28.676639873Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:38:28.676710 env[1353]: time="2025-05-13T00:38:28.676692542Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:38:28.676710 env[1353]: time="2025-05-13T00:38:28.676719062Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:38:28.676891 env[1353]: time="2025-05-13T00:38:28.676729371Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:38:28.678310 env[1353]: time="2025-05-13T00:38:28.678290671Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:38:28.678310 env[1353]: time="2025-05-13T00:38:28.678305960Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:38:28.678386 env[1353]: time="2025-05-13T00:38:28.678317872Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:38:28.678386 env[1353]: time="2025-05-13T00:38:28.678325306Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:38:29.034255 env[1353]: time="2025-05-13T00:38:29.034198907Z" level=info msg="Loading containers: start." May 13 00:38:29.081000 audit[1387]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.081000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe67caffd0 a2=0 a3=7ffe67caffbc items=0 ppid=1353 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.081000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:38:29.082000 audit[1389]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.082000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeaf379aa0 a2=0 a3=7ffeaf379a8c items=0 ppid=1353 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:38:29.084000 audit[1391]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.084000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcca525640 a2=0 a3=7ffcca52562c items=0 ppid=1353 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.084000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:38:29.085000 audit[1393]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.085000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd1b6f0a30 a2=0 a3=7ffd1b6f0a1c items=0 ppid=1353 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.085000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:38:29.087000 audit[1395]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.087000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd3dba4090 a2=0 a3=7ffd3dba407c items=0 ppid=1353 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.087000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 00:38:29.109000 audit[1400]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.109000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe20a49bd0 a2=0 a3=7ffe20a49bbc items=0 ppid=1353 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 00:38:29.118000 audit[1402]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.118000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff31e9d120 a2=0 a3=7fff31e9d10c items=0 ppid=1353 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.118000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 00:38:29.120000 audit[1404]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.120000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd8c75a8b0 a2=0 a3=7ffd8c75a89c items=0 ppid=1353 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 00:38:29.121000 audit[1406]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.121000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd2a847960 a2=0 a3=7ffd2a84794c items=0 ppid=1353 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.121000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:38:29.129000 audit[1410]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.129000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd53243750 a2=0 a3=7ffd5324373c items=0 ppid=1353 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.129000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:38:29.134000 audit[1411]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.134000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd2f7f3720 a2=0 a3=7ffd2f7f370c items=0 ppid=1353 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:38:29.143935 kernel: Initializing XFRM netlink socket May 13 00:38:29.169876 env[1353]: time="2025-05-13T00:38:29.169834748Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 00:38:29.184000 audit[1419]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.184000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd57138e50 a2=0 a3=7ffd57138e3c items=0 ppid=1353 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.184000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 00:38:29.194000 audit[1422]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.194000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcbe754ad0 a2=0 a3=7ffcbe754abc items=0 ppid=1353 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.194000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 00:38:29.197000 audit[1425]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.197000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffda8c7a390 a2=0 a3=7ffda8c7a37c items=0 ppid=1353 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.197000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 00:38:29.198000 audit[1427]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.198000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffce2548e10 a2=0 a3=7ffce2548dfc items=0 ppid=1353 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.198000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 00:38:29.200000 audit[1429]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.200000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffeccd46f80 a2=0 a3=7ffeccd46f6c items=0 ppid=1353 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.200000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 00:38:29.201000 audit[1431]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.201000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff2dd38d00 a2=0 a3=7fff2dd38cec items=0 ppid=1353 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.201000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 00:38:29.203000 audit[1433]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.203000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff113d9bb0 a2=0 a3=7fff113d9b9c items=0 ppid=1353 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.203000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 00:38:29.209000 audit[1436]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.209000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd9013e8d0 a2=0 a3=7ffd9013e8bc items=0 ppid=1353 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.209000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 00:38:29.211000 audit[1438]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.211000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc492fc950 a2=0 a3=7ffc492fc93c items=0 ppid=1353 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:38:29.212000 audit[1440]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.212000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdcca86010 a2=0 a3=7ffdcca85ffc items=0 ppid=1353 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.212000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:38:29.214000 audit[1442]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.214000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd193f6bb0 a2=0 a3=7ffd193f6b9c items=0 ppid=1353 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.214000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 00:38:29.215364 systemd-networkd[1032]: docker0: Link UP May 13 00:38:29.222000 audit[1446]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.222000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff90595a70 a2=0 a3=7fff90595a5c items=0 ppid=1353 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.222000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:38:29.229000 audit[1447]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:29.229000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe3aba4350 a2=0 a3=7ffe3aba433c items=0 ppid=1353 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:29.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:38:29.231146 env[1353]: time="2025-05-13T00:38:29.231110678Z" level=info msg="Loading containers: done." May 13 00:38:29.245658 env[1353]: time="2025-05-13T00:38:29.245607510Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 00:38:29.245838 env[1353]: time="2025-05-13T00:38:29.245812745Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 00:38:29.245976 env[1353]: time="2025-05-13T00:38:29.245952528Z" level=info msg="Daemon has completed initialization" May 13 00:38:29.263820 systemd[1]: Started docker.service. May 13 00:38:29.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:29.270590 env[1353]: time="2025-05-13T00:38:29.270552247Z" level=info msg="API listen on /run/docker.sock" May 13 00:38:29.972267 env[1204]: time="2025-05-13T00:38:29.972023197Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 13 00:38:30.566224 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount290968585.mount: Deactivated successfully. May 13 00:38:31.901350 env[1204]: time="2025-05-13T00:38:31.901289958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:31.903755 env[1204]: time="2025-05-13T00:38:31.903697175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:31.905765 env[1204]: time="2025-05-13T00:38:31.905727915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:31.907596 env[1204]: time="2025-05-13T00:38:31.907566175Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:31.908307 env[1204]: time="2025-05-13T00:38:31.908259977Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 13 00:38:31.910266 env[1204]: time="2025-05-13T00:38:31.910238990Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 13 00:38:34.017928 env[1204]: time="2025-05-13T00:38:34.017860701Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:34.019604 env[1204]: time="2025-05-13T00:38:34.019574247Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:34.021416 env[1204]: time="2025-05-13T00:38:34.021352082Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:34.023094 env[1204]: time="2025-05-13T00:38:34.023044418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:34.023741 env[1204]: time="2025-05-13T00:38:34.023704927Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 13 00:38:34.024268 env[1204]: time="2025-05-13T00:38:34.024231245Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 13 00:38:35.503677 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 00:38:35.503950 systemd[1]: Stopped kubelet.service. May 13 00:38:35.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:35.505593 systemd[1]: Starting kubelet.service... May 13 00:38:35.508162 kernel: kauditd_printk_skb: 84 callbacks suppressed May 13 00:38:35.508221 kernel: audit: type=1130 audit(1747096715.503:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:35.508248 kernel: audit: type=1131 audit(1747096715.503:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:35.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:35.747758 systemd[1]: Started kubelet.service. May 13 00:38:35.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:35.751936 kernel: audit: type=1130 audit(1747096715.747:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:36.123517 kubelet[1489]: E0513 00:38:36.123461 1489 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:38:36.126146 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:38:36.126261 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:38:36.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:38:36.129922 kernel: audit: type=1131 audit(1747096716.125:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:38:36.970446 env[1204]: time="2025-05-13T00:38:36.970388337Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:36.973170 env[1204]: time="2025-05-13T00:38:36.973119292Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:36.974904 env[1204]: time="2025-05-13T00:38:36.974862112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:36.977107 env[1204]: time="2025-05-13T00:38:36.977068593Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:36.977696 env[1204]: time="2025-05-13T00:38:36.977669370Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 13 00:38:36.978091 env[1204]: time="2025-05-13T00:38:36.978068168Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 13 00:38:38.341240 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3107998307.mount: Deactivated successfully. May 13 00:38:39.329118 env[1204]: time="2025-05-13T00:38:39.329057261Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:39.330984 env[1204]: time="2025-05-13T00:38:39.330935806Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:39.332194 env[1204]: time="2025-05-13T00:38:39.332168819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:39.333431 env[1204]: time="2025-05-13T00:38:39.333394098Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:39.333781 env[1204]: time="2025-05-13T00:38:39.333748573Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 13 00:38:39.334275 env[1204]: time="2025-05-13T00:38:39.334245436Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 13 00:38:39.874360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount831712615.mount: Deactivated successfully. May 13 00:38:40.810350 env[1204]: time="2025-05-13T00:38:40.810287122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:40.812040 env[1204]: time="2025-05-13T00:38:40.811996139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:40.813655 env[1204]: time="2025-05-13T00:38:40.813603535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:40.815234 env[1204]: time="2025-05-13T00:38:40.815209649Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:40.815968 env[1204]: time="2025-05-13T00:38:40.815935371Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 13 00:38:40.816475 env[1204]: time="2025-05-13T00:38:40.816454054Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 13 00:38:41.283347 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2112474999.mount: Deactivated successfully. May 13 00:38:41.288390 env[1204]: time="2025-05-13T00:38:41.288317301Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:41.290064 env[1204]: time="2025-05-13T00:38:41.290034624Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:41.291346 env[1204]: time="2025-05-13T00:38:41.291319775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:41.292605 env[1204]: time="2025-05-13T00:38:41.292577666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:41.293000 env[1204]: time="2025-05-13T00:38:41.292970904Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 13 00:38:41.293478 env[1204]: time="2025-05-13T00:38:41.293459490Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 13 00:38:41.785187 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3286764010.mount: Deactivated successfully. May 13 00:38:44.684337 env[1204]: time="2025-05-13T00:38:44.684257500Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:44.686356 env[1204]: time="2025-05-13T00:38:44.686284984Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:44.687939 env[1204]: time="2025-05-13T00:38:44.687915654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:44.689584 env[1204]: time="2025-05-13T00:38:44.689556904Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:44.690399 env[1204]: time="2025-05-13T00:38:44.690361093Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 13 00:38:46.253559 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 00:38:46.253770 systemd[1]: Stopped kubelet.service. May 13 00:38:46.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.255163 systemd[1]: Starting kubelet.service... May 13 00:38:46.265922 kernel: audit: type=1130 audit(1747096726.252:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.265990 kernel: audit: type=1131 audit(1747096726.252:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.327532 systemd[1]: Started kubelet.service. May 13 00:38:46.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.331936 kernel: audit: type=1130 audit(1747096726.326:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.357418 kubelet[1521]: E0513 00:38:46.357355 1521 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:38:46.358951 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:38:46.359086 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:38:46.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:38:46.362918 kernel: audit: type=1131 audit(1747096726.358:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:38:46.772381 systemd[1]: Stopped kubelet.service. May 13 00:38:46.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.774326 systemd[1]: Starting kubelet.service... May 13 00:38:46.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.779319 kernel: audit: type=1130 audit(1747096726.771:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.779379 kernel: audit: type=1131 audit(1747096726.771:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:46.798371 systemd[1]: Reloading. May 13 00:38:46.854541 /usr/lib/systemd/system-generators/torcx-generator[1555]: time="2025-05-13T00:38:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:38:46.854568 /usr/lib/systemd/system-generators/torcx-generator[1555]: time="2025-05-13T00:38:46Z" level=info msg="torcx already run" May 13 00:38:47.339946 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:38:47.339960 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:38:47.356743 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:38:47.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.419798 kernel: audit: type=1400 audit(1747096727.412:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.419844 kernel: audit: type=1400 audit(1747096727.412:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.419867 kernel: audit: type=1400 audit(1747096727.412:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426189 kernel: audit: type=1400 audit(1747096727.412:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.418000 audit: BPF prog-id=43 op=LOAD May 13 00:38:47.418000 audit: BPF prog-id=37 op=UNLOAD May 13 00:38:47.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit: BPF prog-id=44 op=LOAD May 13 00:38:47.422000 audit: BPF prog-id=27 op=UNLOAD May 13 00:38:47.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit: BPF prog-id=45 op=LOAD May 13 00:38:47.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.425000 audit: BPF prog-id=46 op=LOAD May 13 00:38:47.425000 audit: BPF prog-id=28 op=UNLOAD May 13 00:38:47.425000 audit: BPF prog-id=29 op=UNLOAD May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit: BPF prog-id=47 op=LOAD May 13 00:38:47.426000 audit: BPF prog-id=38 op=UNLOAD May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit: BPF prog-id=48 op=LOAD May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.426000 audit: BPF prog-id=49 op=LOAD May 13 00:38:47.426000 audit: BPF prog-id=39 op=UNLOAD May 13 00:38:47.426000 audit: BPF prog-id=40 op=UNLOAD May 13 00:38:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.427000 audit: BPF prog-id=50 op=LOAD May 13 00:38:47.427000 audit: BPF prog-id=30 op=UNLOAD May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit: BPF prog-id=51 op=LOAD May 13 00:38:47.428000 audit: BPF prog-id=31 op=UNLOAD May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit: BPF prog-id=52 op=LOAD May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.428000 audit: BPF prog-id=53 op=LOAD May 13 00:38:47.428000 audit: BPF prog-id=32 op=UNLOAD May 13 00:38:47.428000 audit: BPF prog-id=33 op=UNLOAD May 13 00:38:47.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.429000 audit: BPF prog-id=54 op=LOAD May 13 00:38:47.429000 audit: BPF prog-id=41 op=UNLOAD May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit: BPF prog-id=55 op=LOAD May 13 00:38:47.430000 audit: BPF prog-id=36 op=UNLOAD May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit: BPF prog-id=56 op=LOAD May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.430000 audit: BPF prog-id=57 op=LOAD May 13 00:38:47.430000 audit: BPF prog-id=34 op=UNLOAD May 13 00:38:47.430000 audit: BPF prog-id=35 op=UNLOAD May 13 00:38:47.439805 systemd[1]: Started kubelet.service. May 13 00:38:47.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:47.440826 systemd[1]: Stopping kubelet.service... May 13 00:38:47.441071 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:38:47.441200 systemd[1]: Stopped kubelet.service. May 13 00:38:47.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:47.442284 systemd[1]: Starting kubelet.service... May 13 00:38:47.511557 systemd[1]: Started kubelet.service. May 13 00:38:47.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:47.541885 kubelet[1604]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:38:47.541885 kubelet[1604]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:38:47.541885 kubelet[1604]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:38:47.542301 kubelet[1604]: I0513 00:38:47.541962 1604 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:38:47.856453 kubelet[1604]: I0513 00:38:47.856415 1604 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 00:38:47.856453 kubelet[1604]: I0513 00:38:47.856441 1604 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:38:47.856667 kubelet[1604]: I0513 00:38:47.856651 1604 server.go:929] "Client rotation is on, will bootstrap in background" May 13 00:38:47.882980 kubelet[1604]: I0513 00:38:47.882964 1604 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:38:47.884187 kubelet[1604]: E0513 00:38:47.884164 1604 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.18:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:47.889477 kubelet[1604]: E0513 00:38:47.889442 1604 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:38:47.889477 kubelet[1604]: I0513 00:38:47.889475 1604 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:38:47.894210 kubelet[1604]: I0513 00:38:47.894184 1604 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:38:47.895055 kubelet[1604]: I0513 00:38:47.895010 1604 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 00:38:47.895382 kubelet[1604]: I0513 00:38:47.895338 1604 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:38:47.895564 kubelet[1604]: I0513 00:38:47.895374 1604 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:38:47.895564 kubelet[1604]: I0513 00:38:47.895545 1604 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:38:47.895564 kubelet[1604]: I0513 00:38:47.895554 1604 container_manager_linux.go:300] "Creating device plugin manager" May 13 00:38:47.895826 kubelet[1604]: I0513 00:38:47.895647 1604 state_mem.go:36] "Initialized new in-memory state store" May 13 00:38:47.898337 kubelet[1604]: I0513 00:38:47.898310 1604 kubelet.go:408] "Attempting to sync node with API server" May 13 00:38:47.898337 kubelet[1604]: I0513 00:38:47.898335 1604 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:38:47.898418 kubelet[1604]: I0513 00:38:47.898379 1604 kubelet.go:314] "Adding apiserver pod source" May 13 00:38:47.898418 kubelet[1604]: I0513 00:38:47.898396 1604 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:38:47.911016 kubelet[1604]: W0513 00:38:47.910968 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.18:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 13 00:38:47.911071 kubelet[1604]: E0513 00:38:47.911030 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.18:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:47.911109 kubelet[1604]: W0513 00:38:47.911074 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 13 00:38:47.911222 kubelet[1604]: E0513 00:38:47.911106 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:47.920375 kubelet[1604]: I0513 00:38:47.920326 1604 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:38:47.923769 kubelet[1604]: I0513 00:38:47.923756 1604 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:38:47.923841 kubelet[1604]: W0513 00:38:47.923815 1604 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:38:47.924355 kubelet[1604]: I0513 00:38:47.924338 1604 server.go:1269] "Started kubelet" May 13 00:38:47.924414 kubelet[1604]: I0513 00:38:47.924398 1604 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:38:47.925311 kubelet[1604]: I0513 00:38:47.924720 1604 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:38:47.925311 kubelet[1604]: I0513 00:38:47.925014 1604 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:38:47.924000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.924000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:38:47.924000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00097f080 a1=c00063fef0 a2=c00097f050 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.924000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:38:47.924000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:47.924000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:38:47.924000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000655fe0 a1=c00063ff08 a2=c00097f110 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.924000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:38:47.925956 kubelet[1604]: I0513 00:38:47.925524 1604 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:38:47.925956 kubelet[1604]: I0513 00:38:47.925567 1604 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:38:47.925956 kubelet[1604]: I0513 00:38:47.925636 1604 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:38:47.926693 kubelet[1604]: I0513 00:38:47.926146 1604 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:38:47.926755 kubelet[1604]: I0513 00:38:47.926706 1604 server.go:460] "Adding debug handlers to kubelet server" May 13 00:38:47.928252 kubelet[1604]: E0513 00:38:47.928208 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:38:47.928316 kubelet[1604]: I0513 00:38:47.928281 1604 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 00:38:47.927000 audit[1616]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:47.927000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6c891940 a2=0 a3=7ffd6c89192c items=0 ppid=1604 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:38:47.928526 kubelet[1604]: E0513 00:38:47.928412 1604 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:38:47.928526 kubelet[1604]: I0513 00:38:47.928469 1604 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 00:38:47.928587 kubelet[1604]: I0513 00:38:47.928529 1604 reconciler.go:26] "Reconciler: start to sync state" May 13 00:38:47.928831 kubelet[1604]: W0513 00:38:47.928796 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 13 00:38:47.928888 kubelet[1604]: E0513 00:38:47.928849 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:47.929078 kubelet[1604]: I0513 00:38:47.928962 1604 factory.go:221] Registration of the systemd container factory successfully May 13 00:38:47.929130 kubelet[1604]: E0513 00:38:47.929078 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.18:6443: connect: connection refused" interval="200ms" May 13 00:38:47.929130 kubelet[1604]: I0513 00:38:47.929097 1604 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:38:47.928000 audit[1617]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:47.928000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff526884a0 a2=0 a3=7fff5268848c items=0 ppid=1604 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:38:47.930053 kubelet[1604]: E0513 00:38:47.928181 1604 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.18:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.18:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eef37b02d1d00 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:38:47.92431744 +0000 UTC m=+0.409906271,LastTimestamp:2025-05-13 00:38:47.92431744 +0000 UTC m=+0.409906271,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:38:47.930476 kubelet[1604]: I0513 00:38:47.930451 1604 factory.go:221] Registration of the containerd container factory successfully May 13 00:38:47.930000 audit[1619]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:47.930000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff3e030a00 a2=0 a3=7fff3e0309ec items=0 ppid=1604 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.930000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:38:47.932000 audit[1621]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:47.932000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff037d4260 a2=0 a3=7fff037d424c items=0 ppid=1604 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:38:47.938000 audit[1626]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:47.938000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffd9657ec0 a2=0 a3=7fffd9657eac items=0 ppid=1604 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:38:47.939542 kubelet[1604]: I0513 00:38:47.939485 1604 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:38:47.939000 audit[1627]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:38:47.939000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcde1e3770 a2=0 a3=7ffcde1e375c items=0 ppid=1604 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:38:47.939000 audit[1628]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:47.939000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcf11e830 a2=0 a3=7fffcf11e81c items=0 ppid=1604 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:38:47.940690 kubelet[1604]: I0513 00:38:47.940424 1604 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:38:47.940690 kubelet[1604]: I0513 00:38:47.940448 1604 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:38:47.940690 kubelet[1604]: I0513 00:38:47.940466 1604 kubelet.go:2321] "Starting kubelet main sync loop" May 13 00:38:47.940690 kubelet[1604]: E0513 00:38:47.940500 1604 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:38:47.940000 audit[1630]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:47.940000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1c770a50 a2=0 a3=7fff1c770a3c items=0 ppid=1604 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:38:47.940000 audit[1631]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:38:47.940000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4e6449b0 a2=0 a3=7fff4e64499c items=0 ppid=1604 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:38:47.941000 audit[1632]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:47.941000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe28372480 a2=0 a3=7ffe2837246c items=0 ppid=1604 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:38:47.941000 audit[1633]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:38:47.941000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc85678b00 a2=0 a3=7ffc85678aec items=0 ppid=1604 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:38:47.942635 kubelet[1604]: I0513 00:38:47.942610 1604 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:38:47.942635 kubelet[1604]: I0513 00:38:47.942630 1604 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:38:47.942734 kubelet[1604]: I0513 00:38:47.942650 1604 state_mem.go:36] "Initialized new in-memory state store" May 13 00:38:47.942000 audit[1634]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:38:47.942000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff63603960 a2=0 a3=7fff6360394c items=0 ppid=1604 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:47.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:38:47.943694 kubelet[1604]: W0513 00:38:47.943555 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 13 00:38:47.943694 kubelet[1604]: E0513 00:38:47.943604 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:48.028458 kubelet[1604]: E0513 00:38:48.028387 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:38:48.041388 kubelet[1604]: E0513 00:38:48.041318 1604 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:38:48.128764 kubelet[1604]: E0513 00:38:48.128616 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:38:48.130241 kubelet[1604]: E0513 00:38:48.130196 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.18:6443: connect: connection refused" interval="400ms" May 13 00:38:48.194872 kubelet[1604]: I0513 00:38:48.194644 1604 policy_none.go:49] "None policy: Start" May 13 00:38:48.196287 kubelet[1604]: I0513 00:38:48.196249 1604 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:38:48.196287 kubelet[1604]: I0513 00:38:48.196283 1604 state_mem.go:35] "Initializing new in-memory state store" May 13 00:38:48.206749 systemd[1]: Created slice kubepods.slice. May 13 00:38:48.210544 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:38:48.221839 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:38:48.222873 kubelet[1604]: I0513 00:38:48.222844 1604 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:38:48.222967 kubelet[1604]: I0513 00:38:48.222922 1604 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:38:48.223052 kubelet[1604]: I0513 00:38:48.223033 1604 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:38:48.223100 kubelet[1604]: I0513 00:38:48.223046 1604 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:38:48.224267 kubelet[1604]: I0513 00:38:48.223315 1604 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:38:48.221000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:48.221000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:38:48.221000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e295c0 a1=c000ebd758 a2=c000e29590 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:48.221000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:38:48.226207 kubelet[1604]: E0513 00:38:48.226190 1604 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 13 00:38:48.252844 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 13 00:38:48.264488 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 13 00:38:48.278350 systemd[1]: Created slice kubepods-burstable-podd260d23ed5bc0cb24c75f2fc37298bb3.slice. May 13 00:38:48.324864 kubelet[1604]: I0513 00:38:48.324819 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:38:48.325290 kubelet[1604]: E0513 00:38:48.325246 1604 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.18:6443/api/v1/nodes\": dial tcp 10.0.0.18:6443: connect: connection refused" node="localhost" May 13 00:38:48.331639 kubelet[1604]: I0513 00:38:48.331602 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:48.331639 kubelet[1604]: I0513 00:38:48.331639 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 13 00:38:48.331773 kubelet[1604]: I0513 00:38:48.331688 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d260d23ed5bc0cb24c75f2fc37298bb3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d260d23ed5bc0cb24c75f2fc37298bb3\") " pod="kube-system/kube-apiserver-localhost" May 13 00:38:48.331773 kubelet[1604]: I0513 00:38:48.331702 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d260d23ed5bc0cb24c75f2fc37298bb3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d260d23ed5bc0cb24c75f2fc37298bb3\") " pod="kube-system/kube-apiserver-localhost" May 13 00:38:48.331773 kubelet[1604]: I0513 00:38:48.331719 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:48.331773 kubelet[1604]: I0513 00:38:48.331737 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:48.331773 kubelet[1604]: I0513 00:38:48.331751 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:48.331888 kubelet[1604]: I0513 00:38:48.331764 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d260d23ed5bc0cb24c75f2fc37298bb3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d260d23ed5bc0cb24c75f2fc37298bb3\") " pod="kube-system/kube-apiserver-localhost" May 13 00:38:48.331888 kubelet[1604]: I0513 00:38:48.331840 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:48.527292 kubelet[1604]: I0513 00:38:48.527254 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:38:48.527600 kubelet[1604]: E0513 00:38:48.527566 1604 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.18:6443/api/v1/nodes\": dial tcp 10.0.0.18:6443: connect: connection refused" node="localhost" May 13 00:38:48.531204 kubelet[1604]: E0513 00:38:48.531156 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.18:6443: connect: connection refused" interval="800ms" May 13 00:38:48.560699 kubelet[1604]: E0513 00:38:48.560636 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:48.561528 env[1204]: time="2025-05-13T00:38:48.561470662Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 13 00:38:48.566762 kubelet[1604]: E0513 00:38:48.566732 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:48.567290 env[1204]: time="2025-05-13T00:38:48.567243234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 13 00:38:48.581717 kubelet[1604]: E0513 00:38:48.581657 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:48.582298 env[1204]: time="2025-05-13T00:38:48.582250865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d260d23ed5bc0cb24c75f2fc37298bb3,Namespace:kube-system,Attempt:0,}" May 13 00:38:48.715760 kubelet[1604]: W0513 00:38:48.715663 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.18:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 13 00:38:48.715944 kubelet[1604]: E0513 00:38:48.715765 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.18:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:48.754319 kubelet[1604]: W0513 00:38:48.754207 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 13 00:38:48.754319 kubelet[1604]: E0513 00:38:48.754299 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:48.930176 kubelet[1604]: I0513 00:38:48.930056 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:38:48.930520 kubelet[1604]: E0513 00:38:48.930448 1604 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.18:6443/api/v1/nodes\": dial tcp 10.0.0.18:6443: connect: connection refused" node="localhost" May 13 00:38:49.224673 kubelet[1604]: W0513 00:38:49.224392 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 13 00:38:49.224673 kubelet[1604]: E0513 00:38:49.224495 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:49.247773 kubelet[1604]: W0513 00:38:49.247551 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.18:6443: connect: connection refused May 13 00:38:49.247773 kubelet[1604]: E0513 00:38:49.247698 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:49.332226 kubelet[1604]: E0513 00:38:49.332142 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.18:6443: connect: connection refused" interval="1.6s" May 13 00:38:49.379584 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount286050024.mount: Deactivated successfully. May 13 00:38:49.390335 env[1204]: time="2025-05-13T00:38:49.390254145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.394045 env[1204]: time="2025-05-13T00:38:49.393957374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.394985 env[1204]: time="2025-05-13T00:38:49.394946269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.396951 env[1204]: time="2025-05-13T00:38:49.396792734Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.405636 env[1204]: time="2025-05-13T00:38:49.405528917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.407840 env[1204]: time="2025-05-13T00:38:49.407784680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.413964 env[1204]: time="2025-05-13T00:38:49.413867243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.416997 env[1204]: time="2025-05-13T00:38:49.416892339Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.420375 env[1204]: time="2025-05-13T00:38:49.420257925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.422583 env[1204]: time="2025-05-13T00:38:49.422466659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.427267 env[1204]: time="2025-05-13T00:38:49.427177840Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.432941 env[1204]: time="2025-05-13T00:38:49.432781454Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:38:49.468559 env[1204]: time="2025-05-13T00:38:49.468433914Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:38:49.468559 env[1204]: time="2025-05-13T00:38:49.468489929Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:38:49.468559 env[1204]: time="2025-05-13T00:38:49.468508223Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:38:49.468782 env[1204]: time="2025-05-13T00:38:49.468642004Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a3cbc081f5af5959faa4c38fc59a329147318c2236eaadcc5a2acdf4f5698ca pid=1645 runtime=io.containerd.runc.v2 May 13 00:38:49.494350 systemd[1]: Started cri-containerd-8a3cbc081f5af5959faa4c38fc59a329147318c2236eaadcc5a2acdf4f5698ca.scope. May 13 00:38:49.516721 env[1204]: time="2025-05-13T00:38:49.516638306Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:38:49.516721 env[1204]: time="2025-05-13T00:38:49.516678601Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:38:49.516721 env[1204]: time="2025-05-13T00:38:49.516688911Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:38:49.517778 env[1204]: time="2025-05-13T00:38:49.517503740Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e770e7557666f3323aaca7478e2789a5907c9b0d3abcd3bc9c2d9de9e602336 pid=1671 runtime=io.containerd.runc.v2 May 13 00:38:49.559753 env[1204]: time="2025-05-13T00:38:49.559624987Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:38:49.560027 env[1204]: time="2025-05-13T00:38:49.559997125Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:38:49.560151 env[1204]: time="2025-05-13T00:38:49.560121789Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:38:49.561393 env[1204]: time="2025-05-13T00:38:49.560439766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d590fe2865aee19200ef82949d51b9fe7cc212dd5635744d1694344fc5faa6d3 pid=1686 runtime=io.containerd.runc.v2 May 13 00:38:49.658418 systemd[1]: Started cri-containerd-6e770e7557666f3323aaca7478e2789a5907c9b0d3abcd3bc9c2d9de9e602336.scope. May 13 00:38:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.667000 audit: BPF prog-id=58 op=LOAD May 13 00:38:49.668000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336362633038316635616635393539666161346333386663353961 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336362633038316635616635393539666161346333386663353961 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.668000 audit: BPF prog-id=59 op=LOAD May 13 00:38:49.668000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020b050 items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336362633038316635616635393539666161346333386663353961 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.700000 audit: BPF prog-id=60 op=LOAD May 13 00:38:49.700000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020b098 items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336362633038316635616635393539666161346333386663353961 May 13 00:38:49.700000 audit: BPF prog-id=60 op=UNLOAD May 13 00:38:49.701000 audit: BPF prog-id=59 op=UNLOAD May 13 00:38:49.701000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.701000 audit: BPF prog-id=61 op=LOAD May 13 00:38:49.707011 systemd[1]: Started cri-containerd-d590fe2865aee19200ef82949d51b9fe7cc212dd5635744d1694344fc5faa6d3.scope. May 13 00:38:49.701000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020b4a8 items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861336362633038316635616635393539666161346333386663353961 May 13 00:38:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.773000 audit: BPF prog-id=62 op=LOAD May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1671 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373730653735353736363666333332336161636137343738653237 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1671 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373730653735353736363666333332336161636137343738653237 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit: BPF prog-id=63 op=LOAD May 13 00:38:49.774000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001bfcb0 items=0 ppid=1671 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373730653735353736363666333332336161636137343738653237 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit: BPF prog-id=64 op=LOAD May 13 00:38:49.774000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001bfcf8 items=0 ppid=1671 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373730653735353736363666333332336161636137343738653237 May 13 00:38:49.774000 audit: BPF prog-id=64 op=UNLOAD May 13 00:38:49.774000 audit: BPF prog-id=63 op=UNLOAD May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.774000 audit: BPF prog-id=65 op=LOAD May 13 00:38:49.774000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a4108 items=0 ppid=1671 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373730653735353736363666333332336161636137343738653237 May 13 00:38:49.778771 kubelet[1604]: I0513 00:38:49.774661 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:38:49.778771 kubelet[1604]: E0513 00:38:49.775324 1604 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.18:6443/api/v1/nodes\": dial tcp 10.0.0.18:6443: connect: connection refused" node="localhost" May 13 00:38:49.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.794000 audit: BPF prog-id=66 op=LOAD May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1686 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393066653238363561656531393230306566383239343964353162 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1686 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393066653238363561656531393230306566383239343964353162 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit: BPF prog-id=67 op=LOAD May 13 00:38:49.795000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000382750 items=0 ppid=1686 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393066653238363561656531393230306566383239343964353162 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.795000 audit: BPF prog-id=68 op=LOAD May 13 00:38:49.795000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000382798 items=0 ppid=1686 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393066653238363561656531393230306566383239343964353162 May 13 00:38:49.796000 audit: BPF prog-id=68 op=UNLOAD May 13 00:38:49.796000 audit: BPF prog-id=67 op=UNLOAD May 13 00:38:49.796000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.796000 audit: BPF prog-id=69 op=LOAD May 13 00:38:49.796000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000382ba8 items=0 ppid=1686 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435393066653238363561656531393230306566383239343964353162 May 13 00:38:49.846893 env[1204]: time="2025-05-13T00:38:49.846837200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"8a3cbc081f5af5959faa4c38fc59a329147318c2236eaadcc5a2acdf4f5698ca\"" May 13 00:38:49.848870 kubelet[1604]: E0513 00:38:49.848836 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:49.851006 env[1204]: time="2025-05-13T00:38:49.850957993Z" level=info msg="CreateContainer within sandbox \"8a3cbc081f5af5959faa4c38fc59a329147318c2236eaadcc5a2acdf4f5698ca\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 00:38:49.852816 env[1204]: time="2025-05-13T00:38:49.852758080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d260d23ed5bc0cb24c75f2fc37298bb3,Namespace:kube-system,Attempt:0,} returns sandbox id \"6e770e7557666f3323aaca7478e2789a5907c9b0d3abcd3bc9c2d9de9e602336\"" May 13 00:38:49.853565 kubelet[1604]: E0513 00:38:49.853526 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:49.855167 env[1204]: time="2025-05-13T00:38:49.855125994Z" level=info msg="CreateContainer within sandbox \"6e770e7557666f3323aaca7478e2789a5907c9b0d3abcd3bc9c2d9de9e602336\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 00:38:49.856186 env[1204]: time="2025-05-13T00:38:49.856121441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"d590fe2865aee19200ef82949d51b9fe7cc212dd5635744d1694344fc5faa6d3\"" May 13 00:38:49.857320 kubelet[1604]: E0513 00:38:49.857267 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:49.860973 env[1204]: time="2025-05-13T00:38:49.860875973Z" level=info msg="CreateContainer within sandbox \"d590fe2865aee19200ef82949d51b9fe7cc212dd5635744d1694344fc5faa6d3\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 00:38:49.895221 env[1204]: time="2025-05-13T00:38:49.895104741Z" level=info msg="CreateContainer within sandbox \"8a3cbc081f5af5959faa4c38fc59a329147318c2236eaadcc5a2acdf4f5698ca\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"41b63fc654eb755944933ae903fe2a444b2757a3e2a2a1461ae76ad91e3fd172\"" May 13 00:38:49.896284 env[1204]: time="2025-05-13T00:38:49.896245341Z" level=info msg="StartContainer for \"41b63fc654eb755944933ae903fe2a444b2757a3e2a2a1461ae76ad91e3fd172\"" May 13 00:38:49.907714 env[1204]: time="2025-05-13T00:38:49.907616348Z" level=info msg="CreateContainer within sandbox \"6e770e7557666f3323aaca7478e2789a5907c9b0d3abcd3bc9c2d9de9e602336\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ab178af3d23c34ee7f087e927b7df57f3da3717440219e0b5dbac8af39170628\"" May 13 00:38:49.908737 env[1204]: time="2025-05-13T00:38:49.908689892Z" level=info msg="StartContainer for \"ab178af3d23c34ee7f087e927b7df57f3da3717440219e0b5dbac8af39170628\"" May 13 00:38:49.910540 env[1204]: time="2025-05-13T00:38:49.910495290Z" level=info msg="CreateContainer within sandbox \"d590fe2865aee19200ef82949d51b9fe7cc212dd5635744d1694344fc5faa6d3\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"bd08fba71629d0e0bbf7148e46cdb89d73c498f484b063b613363dba6e03545f\"" May 13 00:38:49.910996 env[1204]: time="2025-05-13T00:38:49.910967286Z" level=info msg="StartContainer for \"bd08fba71629d0e0bbf7148e46cdb89d73c498f484b063b613363dba6e03545f\"" May 13 00:38:49.914006 systemd[1]: Started cri-containerd-41b63fc654eb755944933ae903fe2a444b2757a3e2a2a1461ae76ad91e3fd172.scope. May 13 00:38:49.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.928000 audit: BPF prog-id=70 op=LOAD May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623633666336353465623735353934343933336165393033666532 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623633666336353465623735353934343933336165393033666532 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit: BPF prog-id=71 op=LOAD May 13 00:38:49.929000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000293890 items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623633666336353465623735353934343933336165393033666532 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit: BPF prog-id=72 op=LOAD May 13 00:38:49.929000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002938d8 items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623633666336353465623735353934343933336165393033666532 May 13 00:38:49.929000 audit: BPF prog-id=72 op=UNLOAD May 13 00:38:49.929000 audit: BPF prog-id=71 op=UNLOAD May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.929000 audit: BPF prog-id=73 op=LOAD May 13 00:38:49.929000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000293ce8 items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623633666336353465623735353934343933336165393033666532 May 13 00:38:49.934071 systemd[1]: Started cri-containerd-ab178af3d23c34ee7f087e927b7df57f3da3717440219e0b5dbac8af39170628.scope. May 13 00:38:49.939601 systemd[1]: Started cri-containerd-bd08fba71629d0e0bbf7148e46cdb89d73c498f484b063b613363dba6e03545f.scope. May 13 00:38:49.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.952000 audit: BPF prog-id=74 op=LOAD May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313738616633643233633334656537663038376539323762376466 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313738616633643233633334656537663038376539323762376466 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit: BPF prog-id=75 op=LOAD May 13 00:38:49.953000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000292670 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313738616633643233633334656537663038376539323762376466 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.953000 audit: BPF prog-id=76 op=LOAD May 13 00:38:49.953000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0002926b8 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313738616633643233633334656537663038376539323762376466 May 13 00:38:49.954000 audit: BPF prog-id=76 op=UNLOAD May 13 00:38:49.954000 audit: BPF prog-id=75 op=UNLOAD May 13 00:38:49.954000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.954000 audit: BPF prog-id=77 op=LOAD May 13 00:38:49.954000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000292ac8 items=0 ppid=1671 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313738616633643233633334656537663038376539323762376466 May 13 00:38:49.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit: BPF prog-id=78 op=LOAD May 13 00:38:49.958000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.958000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1686 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303866626137313632396430653062626637313438653436636462 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1686 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303866626137313632396430653062626637313438653436636462 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.959000 audit: BPF prog-id=79 op=LOAD May 13 00:38:49.959000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025b60 items=0 ppid=1686 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303866626137313632396430653062626637313438653436636462 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.960000 audit: BPF prog-id=80 op=LOAD May 13 00:38:49.960000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025ba8 items=0 ppid=1686 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303866626137313632396430653062626637313438653436636462 May 13 00:38:49.963000 audit: BPF prog-id=80 op=UNLOAD May 13 00:38:49.963000 audit: BPF prog-id=79 op=UNLOAD May 13 00:38:49.964000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:49.964000 audit: BPF prog-id=81 op=LOAD May 13 00:38:49.964000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025fb8 items=0 ppid=1686 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:49.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264303866626137313632396430653062626637313438653436636462 May 13 00:38:49.974939 env[1204]: time="2025-05-13T00:38:49.972322554Z" level=info msg="StartContainer for \"41b63fc654eb755944933ae903fe2a444b2757a3e2a2a1461ae76ad91e3fd172\" returns successfully" May 13 00:38:49.998644 env[1204]: time="2025-05-13T00:38:49.998581638Z" level=info msg="StartContainer for \"ab178af3d23c34ee7f087e927b7df57f3da3717440219e0b5dbac8af39170628\" returns successfully" May 13 00:38:50.000973 env[1204]: time="2025-05-13T00:38:50.000817684Z" level=info msg="StartContainer for \"bd08fba71629d0e0bbf7148e46cdb89d73c498f484b063b613363dba6e03545f\" returns successfully" May 13 00:38:50.004970 kubelet[1604]: E0513 00:38:50.004886 1604 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.18:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.18:6443: connect: connection refused" logger="UnhandledError" May 13 00:38:50.620000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:50.620000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0004201c0 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:38:50.620000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:38:50.620000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:50.620000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000694a50 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:38:50.620000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:38:50.960296 kubelet[1604]: E0513 00:38:50.956298 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:50.960296 kubelet[1604]: E0513 00:38:50.959263 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:50.977807 kubelet[1604]: E0513 00:38:50.976348 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:51.377609 kubelet[1604]: I0513 00:38:51.377014 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:38:51.949000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.956086 kernel: kauditd_printk_skb: 567 callbacks suppressed May 13 00:38:51.956164 kernel: audit: type=1400 audit(1747096731.949:549): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.956191 kernel: audit: type=1300 audit(1747096731.949:549): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003e70000 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.949000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003e70000 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.965416 kernel: audit: type=1327 audit(1747096731.949:549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:51.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:51.969230 kernel: audit: type=1400 audit(1747096731.950:550): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.950000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.974174 kernel: audit: type=1300 audit(1747096731.950:550): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006908100 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.950000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006908100 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.978511 kernel: audit: type=1327 audit(1747096731.950:550): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:51.950000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:51.982375 kernel: audit: type=1400 audit(1747096731.950:551): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.950000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.987138 kernel: audit: type=1300 audit(1747096731.950:551): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003e701b0 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.950000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003e701b0 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.987241 kubelet[1604]: E0513 00:38:51.983624 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:51.987241 kubelet[1604]: E0513 00:38:51.985081 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:51.987241 kubelet[1604]: E0513 00:38:51.985382 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:51.950000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:51.997919 kernel: audit: type=1327 audit(1747096731.950:551): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:51.951000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:52.002099 kubelet[1604]: E0513 00:38:51.998264 1604 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 13 00:38:52.002919 kernel: audit: type=1400 audit(1747096731.951:552): avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.951000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0040d4a80 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.951000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:51.965000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.965000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006908e80 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.965000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:51.965000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:51.965000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c005b2a5d0 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:38:51.965000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:38:52.096585 kubelet[1604]: I0513 00:38:52.096545 1604 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 13 00:38:52.096585 kubelet[1604]: E0513 00:38:52.096577 1604 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 13 00:38:52.913704 kubelet[1604]: I0513 00:38:52.913634 1604 apiserver.go:52] "Watching apiserver" May 13 00:38:52.928842 kubelet[1604]: I0513 00:38:52.928792 1604 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 00:38:52.986480 kubelet[1604]: E0513 00:38:52.986451 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:53.559249 kubelet[1604]: E0513 00:38:53.559202 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:53.957779 systemd[1]: Reloading. May 13 00:38:53.979946 kubelet[1604]: E0513 00:38:53.979916 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:53.980178 kubelet[1604]: E0513 00:38:53.980145 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:54.037583 /usr/lib/systemd/system-generators/torcx-generator[1898]: time="2025-05-13T00:38:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:38:54.038058 /usr/lib/systemd/system-generators/torcx-generator[1898]: time="2025-05-13T00:38:54Z" level=info msg="torcx already run" May 13 00:38:54.111148 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:38:54.111169 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:38:54.129718 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:38:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.215000 audit: BPF prog-id=82 op=LOAD May 13 00:38:54.215000 audit: BPF prog-id=58 op=UNLOAD May 13 00:38:54.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.216000 audit: BPF prog-id=83 op=LOAD May 13 00:38:54.216000 audit: BPF prog-id=78 op=UNLOAD May 13 00:38:54.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.217000 audit: BPF prog-id=84 op=LOAD May 13 00:38:54.217000 audit: BPF prog-id=43 op=UNLOAD May 13 00:38:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.218000 audit: BPF prog-id=85 op=LOAD May 13 00:38:54.218000 audit: BPF prog-id=70 op=UNLOAD May 13 00:38:54.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit: BPF prog-id=86 op=LOAD May 13 00:38:54.219000 audit: BPF prog-id=66 op=UNLOAD May 13 00:38:54.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit: BPF prog-id=87 op=LOAD May 13 00:38:54.220000 audit: BPF prog-id=44 op=UNLOAD May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit: BPF prog-id=88 op=LOAD May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.220000 audit: BPF prog-id=89 op=LOAD May 13 00:38:54.220000 audit: BPF prog-id=45 op=UNLOAD May 13 00:38:54.220000 audit: BPF prog-id=46 op=UNLOAD May 13 00:38:54.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit: BPF prog-id=90 op=LOAD May 13 00:38:54.222000 audit: BPF prog-id=47 op=UNLOAD May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit: BPF prog-id=91 op=LOAD May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.222000 audit: BPF prog-id=92 op=LOAD May 13 00:38:54.222000 audit: BPF prog-id=48 op=UNLOAD May 13 00:38:54.222000 audit: BPF prog-id=49 op=UNLOAD May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit: BPF prog-id=93 op=LOAD May 13 00:38:54.223000 audit: BPF prog-id=62 op=UNLOAD May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.223000 audit: BPF prog-id=94 op=LOAD May 13 00:38:54.223000 audit: BPF prog-id=50 op=UNLOAD May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit: BPF prog-id=95 op=LOAD May 13 00:38:54.225000 audit: BPF prog-id=51 op=UNLOAD May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit: BPF prog-id=96 op=LOAD May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit: BPF prog-id=97 op=LOAD May 13 00:38:54.225000 audit: BPF prog-id=52 op=UNLOAD May 13 00:38:54.225000 audit: BPF prog-id=53 op=UNLOAD May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit: BPF prog-id=98 op=LOAD May 13 00:38:54.226000 audit: BPF prog-id=74 op=UNLOAD May 13 00:38:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.226000 audit: BPF prog-id=99 op=LOAD May 13 00:38:54.226000 audit: BPF prog-id=54 op=UNLOAD May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit: BPF prog-id=100 op=LOAD May 13 00:38:54.227000 audit: BPF prog-id=55 op=UNLOAD May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit: BPF prog-id=101 op=LOAD May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.227000 audit: BPF prog-id=102 op=LOAD May 13 00:38:54.227000 audit: BPF prog-id=56 op=UNLOAD May 13 00:38:54.227000 audit: BPF prog-id=57 op=UNLOAD May 13 00:38:54.235821 kubelet[1604]: E0513 00:38:54.235469 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:54.240989 systemd[1]: Stopping kubelet.service... May 13 00:38:54.262000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:54.262000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000378d40 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:38:54.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:38:54.262000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:54.262000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a0fa80 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:38:54.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:38:54.262000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:54.262000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000924ba0 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:38:54.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:38:54.264350 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:38:54.264535 systemd[1]: Stopped kubelet.service. May 13 00:38:54.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:54.264000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:38:54.264000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a0faa0 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:38:54.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:38:54.266733 systemd[1]: Starting kubelet.service... May 13 00:38:54.368349 systemd[1]: Started kubelet.service. May 13 00:38:54.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:54.414869 kubelet[1946]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:38:54.414869 kubelet[1946]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:38:54.414869 kubelet[1946]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:38:54.416146 kubelet[1946]: I0513 00:38:54.416058 1946 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:38:54.429691 kubelet[1946]: I0513 00:38:54.429630 1946 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 00:38:54.429854 kubelet[1946]: I0513 00:38:54.429788 1946 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:38:54.430375 kubelet[1946]: I0513 00:38:54.430347 1946 server.go:929] "Client rotation is on, will bootstrap in background" May 13 00:38:54.432473 kubelet[1946]: I0513 00:38:54.432433 1946 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 00:38:54.435258 kubelet[1946]: I0513 00:38:54.435199 1946 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:38:54.438975 kubelet[1946]: E0513 00:38:54.438941 1946 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:38:54.439041 kubelet[1946]: I0513 00:38:54.438977 1946 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:38:54.444099 kubelet[1946]: I0513 00:38:54.444067 1946 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:38:54.444223 kubelet[1946]: I0513 00:38:54.444204 1946 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 00:38:54.444329 kubelet[1946]: I0513 00:38:54.444291 1946 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:38:54.444520 kubelet[1946]: I0513 00:38:54.444319 1946 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:38:54.444691 kubelet[1946]: I0513 00:38:54.444554 1946 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:38:54.444691 kubelet[1946]: I0513 00:38:54.444572 1946 container_manager_linux.go:300] "Creating device plugin manager" May 13 00:38:54.444691 kubelet[1946]: I0513 00:38:54.444617 1946 state_mem.go:36] "Initialized new in-memory state store" May 13 00:38:54.444839 kubelet[1946]: I0513 00:38:54.444739 1946 kubelet.go:408] "Attempting to sync node with API server" May 13 00:38:54.444839 kubelet[1946]: I0513 00:38:54.444752 1946 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:38:54.444839 kubelet[1946]: I0513 00:38:54.444784 1946 kubelet.go:314] "Adding apiserver pod source" May 13 00:38:54.444839 kubelet[1946]: I0513 00:38:54.444798 1946 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:38:54.451010 kubelet[1946]: I0513 00:38:54.448695 1946 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:38:54.451010 kubelet[1946]: I0513 00:38:54.449293 1946 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:38:54.451010 kubelet[1946]: I0513 00:38:54.449712 1946 server.go:1269] "Started kubelet" May 13 00:38:54.452039 kubelet[1946]: I0513 00:38:54.451975 1946 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:38:54.452505 kubelet[1946]: I0513 00:38:54.452482 1946 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:38:54.452584 kubelet[1946]: I0513 00:38:54.452548 1946 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:38:54.453000 audit[1946]: AVC avc: denied { mac_admin } for pid=1946 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.453000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:38:54.453000 audit[1946]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cc5020 a1=c000c7d110 a2=c000cc4ff0 a3=25 items=0 ppid=1 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:54.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:38:54.453000 audit[1946]: AVC avc: denied { mac_admin } for pid=1946 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.453000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:38:54.453000 audit[1946]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c8bdc0 a1=c000c7d128 a2=c000cc50b0 a3=25 items=0 ppid=1 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:54.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:38:54.454520 kubelet[1946]: I0513 00:38:54.454026 1946 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:38:54.454520 kubelet[1946]: I0513 00:38:54.454069 1946 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:38:54.454520 kubelet[1946]: I0513 00:38:54.454115 1946 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:38:54.454520 kubelet[1946]: I0513 00:38:54.454242 1946 server.go:460] "Adding debug handlers to kubelet server" May 13 00:38:54.455184 kubelet[1946]: I0513 00:38:54.455158 1946 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:38:54.456477 kubelet[1946]: I0513 00:38:54.456453 1946 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 00:38:54.456477 kubelet[1946]: E0513 00:38:54.456509 1946 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:38:54.459383 kubelet[1946]: I0513 00:38:54.457661 1946 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 00:38:54.459383 kubelet[1946]: I0513 00:38:54.457849 1946 reconciler.go:26] "Reconciler: start to sync state" May 13 00:38:54.467042 kubelet[1946]: I0513 00:38:54.464062 1946 factory.go:221] Registration of the systemd container factory successfully May 13 00:38:54.467042 kubelet[1946]: I0513 00:38:54.464192 1946 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:38:54.467042 kubelet[1946]: E0513 00:38:54.465521 1946 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:38:54.467214 kubelet[1946]: I0513 00:38:54.467045 1946 factory.go:221] Registration of the containerd container factory successfully May 13 00:38:54.483625 kubelet[1946]: I0513 00:38:54.483434 1946 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:38:54.484876 kubelet[1946]: I0513 00:38:54.484841 1946 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:38:54.484951 kubelet[1946]: I0513 00:38:54.484882 1946 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:38:54.484951 kubelet[1946]: I0513 00:38:54.484925 1946 kubelet.go:2321] "Starting kubelet main sync loop" May 13 00:38:54.485037 kubelet[1946]: E0513 00:38:54.484979 1946 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:38:54.505251 kubelet[1946]: I0513 00:38:54.505215 1946 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:38:54.505251 kubelet[1946]: I0513 00:38:54.505236 1946 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:38:54.505251 kubelet[1946]: I0513 00:38:54.505255 1946 state_mem.go:36] "Initialized new in-memory state store" May 13 00:38:54.505437 kubelet[1946]: I0513 00:38:54.505420 1946 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 00:38:54.505460 kubelet[1946]: I0513 00:38:54.505432 1946 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 00:38:54.505460 kubelet[1946]: I0513 00:38:54.505454 1946 policy_none.go:49] "None policy: Start" May 13 00:38:54.505965 kubelet[1946]: I0513 00:38:54.505945 1946 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:38:54.506009 kubelet[1946]: I0513 00:38:54.505980 1946 state_mem.go:35] "Initializing new in-memory state store" May 13 00:38:54.506189 kubelet[1946]: I0513 00:38:54.506174 1946 state_mem.go:75] "Updated machine memory state" May 13 00:38:54.509916 kubelet[1946]: I0513 00:38:54.509880 1946 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:38:54.509000 audit[1946]: AVC avc: denied { mac_admin } for pid=1946 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:54.509000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:38:54.509000 audit[1946]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00128e660 a1=c0012a5a88 a2=c00128e630 a3=25 items=0 ppid=1 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:54.509000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:38:54.510182 kubelet[1946]: I0513 00:38:54.509962 1946 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:38:54.510182 kubelet[1946]: I0513 00:38:54.510084 1946 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:38:54.510182 kubelet[1946]: I0513 00:38:54.510105 1946 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:38:54.510846 kubelet[1946]: I0513 00:38:54.510825 1946 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:38:54.593189 kubelet[1946]: E0513 00:38:54.593113 1946 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 13 00:38:54.593189 kubelet[1946]: E0513 00:38:54.593128 1946 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 13 00:38:54.593373 kubelet[1946]: E0513 00:38:54.593119 1946 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 13 00:38:54.614270 kubelet[1946]: I0513 00:38:54.614240 1946 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 13 00:38:54.622685 kubelet[1946]: I0513 00:38:54.622332 1946 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 13 00:38:54.622685 kubelet[1946]: I0513 00:38:54.622512 1946 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 13 00:38:54.658230 kubelet[1946]: I0513 00:38:54.658166 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d260d23ed5bc0cb24c75f2fc37298bb3-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d260d23ed5bc0cb24c75f2fc37298bb3\") " pod="kube-system/kube-apiserver-localhost" May 13 00:38:54.658230 kubelet[1946]: I0513 00:38:54.658209 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d260d23ed5bc0cb24c75f2fc37298bb3-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d260d23ed5bc0cb24c75f2fc37298bb3\") " pod="kube-system/kube-apiserver-localhost" May 13 00:38:54.658230 kubelet[1946]: I0513 00:38:54.658244 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:54.658483 kubelet[1946]: I0513 00:38:54.658265 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:54.658483 kubelet[1946]: I0513 00:38:54.658281 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:54.658483 kubelet[1946]: I0513 00:38:54.658298 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 13 00:38:54.658483 kubelet[1946]: I0513 00:38:54.658318 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d260d23ed5bc0cb24c75f2fc37298bb3-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d260d23ed5bc0cb24c75f2fc37298bb3\") " pod="kube-system/kube-apiserver-localhost" May 13 00:38:54.658483 kubelet[1946]: I0513 00:38:54.658337 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:54.658684 kubelet[1946]: I0513 00:38:54.658356 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:38:54.894229 kubelet[1946]: E0513 00:38:54.894190 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:54.894427 kubelet[1946]: E0513 00:38:54.894285 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:54.894592 kubelet[1946]: E0513 00:38:54.894573 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:55.445538 kubelet[1946]: I0513 00:38:55.445477 1946 apiserver.go:52] "Watching apiserver" May 13 00:38:55.457364 kubelet[1946]: I0513 00:38:55.457326 1946 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 00:38:55.496534 kubelet[1946]: E0513 00:38:55.496472 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:55.496534 kubelet[1946]: E0513 00:38:55.496535 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:55.496979 kubelet[1946]: E0513 00:38:55.496953 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:55.526856 kubelet[1946]: I0513 00:38:55.526778 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.526758054 podStartE2EDuration="3.526758054s" podCreationTimestamp="2025-05-13 00:38:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:38:55.52660138 +0000 UTC m=+1.153594618" watchObservedRunningTime="2025-05-13 00:38:55.526758054 +0000 UTC m=+1.153751302" May 13 00:38:55.527126 kubelet[1946]: I0513 00:38:55.526915 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.526910791 podStartE2EDuration="2.526910791s" podCreationTimestamp="2025-05-13 00:38:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:38:55.518506721 +0000 UTC m=+1.145499969" watchObservedRunningTime="2025-05-13 00:38:55.526910791 +0000 UTC m=+1.153904039" May 13 00:38:55.549640 kubelet[1946]: I0513 00:38:55.549556 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.54953841 podStartE2EDuration="1.54953841s" podCreationTimestamp="2025-05-13 00:38:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:38:55.538700463 +0000 UTC m=+1.165693711" watchObservedRunningTime="2025-05-13 00:38:55.54953841 +0000 UTC m=+1.176531658" May 13 00:38:56.497993 kubelet[1946]: E0513 00:38:56.497958 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:57.070000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:38:57.072500 kernel: kauditd_printk_skb: 278 callbacks suppressed May 13 00:38:57.072562 kernel: audit: type=1400 audit(1747096737.070:808): avc: denied { watch } for pid=1829 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:38:57.070000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000701640 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:38:57.081482 kernel: audit: type=1300 audit(1747096737.070:808): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000701640 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:38:57.070000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:38:57.085680 kernel: audit: type=1327 audit(1747096737.070:808): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:38:57.194119 kubelet[1946]: E0513 00:38:57.194055 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:58.825865 kubelet[1946]: I0513 00:38:58.825744 1946 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 00:38:58.826321 env[1204]: time="2025-05-13T00:38:58.826140831Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:38:58.826554 kubelet[1946]: I0513 00:38:58.826315 1946 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 00:38:59.294166 systemd[1]: Created slice kubepods-besteffort-pod9098cc14_0197_4988_b16b_cbbb0793d34a.slice. May 13 00:38:59.364143 kubelet[1946]: E0513 00:38:59.364089 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:59.386315 kubelet[1946]: I0513 00:38:59.386272 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9098cc14-0197-4988-b16b-cbbb0793d34a-kube-proxy\") pod \"kube-proxy-52nv8\" (UID: \"9098cc14-0197-4988-b16b-cbbb0793d34a\") " pod="kube-system/kube-proxy-52nv8" May 13 00:38:59.386315 kubelet[1946]: I0513 00:38:59.386310 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9098cc14-0197-4988-b16b-cbbb0793d34a-xtables-lock\") pod \"kube-proxy-52nv8\" (UID: \"9098cc14-0197-4988-b16b-cbbb0793d34a\") " pod="kube-system/kube-proxy-52nv8" May 13 00:38:59.386535 kubelet[1946]: I0513 00:38:59.386333 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9098cc14-0197-4988-b16b-cbbb0793d34a-lib-modules\") pod \"kube-proxy-52nv8\" (UID: \"9098cc14-0197-4988-b16b-cbbb0793d34a\") " pod="kube-system/kube-proxy-52nv8" May 13 00:38:59.386535 kubelet[1946]: I0513 00:38:59.386347 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gtnqb\" (UniqueName: \"kubernetes.io/projected/9098cc14-0197-4988-b16b-cbbb0793d34a-kube-api-access-gtnqb\") pod \"kube-proxy-52nv8\" (UID: \"9098cc14-0197-4988-b16b-cbbb0793d34a\") " pod="kube-system/kube-proxy-52nv8" May 13 00:38:59.497199 kubelet[1946]: I0513 00:38:59.497153 1946 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:38:59.503731 kubelet[1946]: E0513 00:38:59.503701 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:59.601853 kubelet[1946]: E0513 00:38:59.601728 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:59.602510 env[1204]: time="2025-05-13T00:38:59.602468657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-52nv8,Uid:9098cc14-0197-4988-b16b-cbbb0793d34a,Namespace:kube-system,Attempt:0,}" May 13 00:38:59.632152 env[1204]: time="2025-05-13T00:38:59.632065936Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:38:59.632152 env[1204]: time="2025-05-13T00:38:59.632131351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:38:59.632152 env[1204]: time="2025-05-13T00:38:59.632143334Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:38:59.632546 env[1204]: time="2025-05-13T00:38:59.632464407Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7a334ac3d563cfaafac262a1a44acd52dc4ebb239a9a5fb8b81b474b91c3402 pid=2022 runtime=io.containerd.runc.v2 May 13 00:38:59.648057 systemd[1]: run-containerd-runc-k8s.io-e7a334ac3d563cfaafac262a1a44acd52dc4ebb239a9a5fb8b81b474b91c3402-runc.dkX2kI.mount: Deactivated successfully. May 13 00:38:59.649568 systemd[1]: Started cri-containerd-e7a334ac3d563cfaafac262a1a44acd52dc4ebb239a9a5fb8b81b474b91c3402.scope. May 13 00:38:59.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.666967 kernel: audit: type=1400 audit(1747096739.659:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.667015 kernel: audit: type=1400 audit(1747096739.659:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.667040 kernel: audit: type=1400 audit(1747096739.659:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.672985 kernel: audit: type=1400 audit(1747096739.659:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.673060 kernel: audit: type=1400 audit(1747096739.659:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.676153 kernel: audit: type=1400 audit(1747096739.659:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.679060 kernel: audit: type=1400 audit(1747096739.659:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit: BPF prog-id=103 op=LOAD May 13 00:38:59.665000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2022 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613333346163336435363363666161666163323632613161343461 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2022 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613333346163336435363363666161666163323632613161343461 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.665000 audit: BPF prog-id=104 op=LOAD May 13 00:38:59.665000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002e1d90 items=0 ppid=2022 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613333346163336435363363666161666163323632613161343461 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.668000 audit: BPF prog-id=105 op=LOAD May 13 00:38:59.668000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002e1dd8 items=0 ppid=2022 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613333346163336435363363666161666163323632613161343461 May 13 00:38:59.677000 audit: BPF prog-id=105 op=UNLOAD May 13 00:38:59.677000 audit: BPF prog-id=104 op=UNLOAD May 13 00:38:59.677000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.677000 audit: BPF prog-id=106 op=LOAD May 13 00:38:59.677000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003461e8 items=0 ppid=2022 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613333346163336435363363666161666163323632613161343461 May 13 00:38:59.694057 env[1204]: time="2025-05-13T00:38:59.694014650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-52nv8,Uid:9098cc14-0197-4988-b16b-cbbb0793d34a,Namespace:kube-system,Attempt:0,} returns sandbox id \"e7a334ac3d563cfaafac262a1a44acd52dc4ebb239a9a5fb8b81b474b91c3402\"" May 13 00:38:59.694847 kubelet[1946]: E0513 00:38:59.694817 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:38:59.696821 env[1204]: time="2025-05-13T00:38:59.696785524Z" level=info msg="CreateContainer within sandbox \"e7a334ac3d563cfaafac262a1a44acd52dc4ebb239a9a5fb8b81b474b91c3402\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:38:59.713077 env[1204]: time="2025-05-13T00:38:59.713014317Z" level=info msg="CreateContainer within sandbox \"e7a334ac3d563cfaafac262a1a44acd52dc4ebb239a9a5fb8b81b474b91c3402\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"65a1ff0d8dd6bed5016dc676d00bdc542a0a77852ea6ca346ee91bc9bd70f8a9\"" May 13 00:38:59.713724 env[1204]: time="2025-05-13T00:38:59.713675919Z" level=info msg="StartContainer for \"65a1ff0d8dd6bed5016dc676d00bdc542a0a77852ea6ca346ee91bc9bd70f8a9\"" May 13 00:38:59.729024 systemd[1]: Started cri-containerd-65a1ff0d8dd6bed5016dc676d00bdc542a0a77852ea6ca346ee91bc9bd70f8a9.scope. May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa20fbe9988 items=0 ppid=2022 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613166663064386464366265643530313664633637366430306264 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit: BPF prog-id=107 op=LOAD May 13 00:38:59.741000 audit[2063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e1bf8 items=0 ppid=2022 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613166663064386464366265643530313664633637366430306264 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit: BPF prog-id=108 op=LOAD May 13 00:38:59.741000 audit[2063]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e1c48 items=0 ppid=2022 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613166663064386464366265643530313664633637366430306264 May 13 00:38:59.741000 audit: BPF prog-id=108 op=UNLOAD May 13 00:38:59.741000 audit: BPF prog-id=107 op=UNLOAD May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:38:59.741000 audit: BPF prog-id=109 op=LOAD May 13 00:38:59.741000 audit[2063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e1cd8 items=0 ppid=2022 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635613166663064386464366265643530313664633637366430306264 May 13 00:38:59.779927 env[1204]: time="2025-05-13T00:38:59.779858277Z" level=info msg="StartContainer for \"65a1ff0d8dd6bed5016dc676d00bdc542a0a77852ea6ca346ee91bc9bd70f8a9\" returns successfully" May 13 00:38:59.812401 systemd[1]: Created slice kubepods-besteffort-pod7d7f0180_3bf6_450b_b82b_316d6db5b4c7.slice. May 13 00:38:59.877000 audit[2138]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.877000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdebf852b0 a2=0 a3=7ffdebf8529c items=0 ppid=2074 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:38:59.879000 audit[2139]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:38:59.879000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff731399c0 a2=0 a3=7fff731399ac items=0 ppid=2074 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:38:59.881000 audit[2141]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.881000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbe25f460 a2=0 a3=7ffcbe25f44c items=0 ppid=2074 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:38:59.881000 audit[2142]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:38:59.881000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec8720020 a2=0 a3=7ffec872000c items=0 ppid=2074 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:38:59.882000 audit[2143]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.882000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcefcd7330 a2=0 a3=7ffcefcd731c items=0 ppid=2074 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:38:59.882000 audit[2144]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:38:59.882000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe48796820 a2=0 a3=7ffe4879680c items=0 ppid=2074 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:38:59.906212 sudo[1341]: pam_unix(sudo:session): session closed for user root May 13 00:38:59.904000 audit[1341]: USER_END pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:59.904000 audit[1341]: CRED_DISP pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:38:59.907788 sshd[1338]: pam_unix(sshd:session): session closed for user core May 13 00:38:59.906000 audit[1338]: USER_END pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:59.906000 audit[1338]: CRED_DISP pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:38:59.909743 systemd[1]: sshd@6-10.0.0.18:22-10.0.0.1:48080.service: Deactivated successfully. May 13 00:38:59.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.18:22-10.0.0.1:48080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:38:59.910384 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:38:59.910504 systemd[1]: session-7.scope: Consumed 3.987s CPU time. May 13 00:38:59.910885 systemd-logind[1194]: Session 7 logged out. Waiting for processes to exit. May 13 00:38:59.911538 systemd-logind[1194]: Removed session 7. May 13 00:38:59.980000 audit[2152]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.980000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffb07c3020 a2=0 a3=7fffb07c300c items=0 ppid=2074 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:38:59.982000 audit[2154]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.982000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeef9c34a0 a2=0 a3=7ffeef9c348c items=0 ppid=2074 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:38:59.984000 audit[2157]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.984000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd83040e00 a2=0 a3=7ffd83040dec items=0 ppid=2074 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:38:59.985000 audit[2158]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.985000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0af8fe10 a2=0 a3=7fff0af8fdfc items=0 ppid=2074 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:38:59.987000 audit[2160]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.987000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe6932d410 a2=0 a3=7ffe6932d3fc items=0 ppid=2074 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:38:59.988000 audit[2161]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.988000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9d228450 a2=0 a3=7ffc9d22843c items=0 ppid=2074 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:38:59.991792 kubelet[1946]: I0513 00:38:59.991762 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7d7f0180-3bf6-450b-b82b-316d6db5b4c7-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-gsm44\" (UID: \"7d7f0180-3bf6-450b-b82b-316d6db5b4c7\") " pod="tigera-operator/tigera-operator-6f6897fdc5-gsm44" May 13 00:38:59.992056 kubelet[1946]: I0513 00:38:59.991793 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dgzd4\" (UniqueName: \"kubernetes.io/projected/7d7f0180-3bf6-450b-b82b-316d6db5b4c7-kube-api-access-dgzd4\") pod \"tigera-operator-6f6897fdc5-gsm44\" (UID: \"7d7f0180-3bf6-450b-b82b-316d6db5b4c7\") " pod="tigera-operator/tigera-operator-6f6897fdc5-gsm44" May 13 00:38:59.990000 audit[2163]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.990000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb1be1ad0 a2=0 a3=7ffdb1be1abc items=0 ppid=2074 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:38:59.992000 audit[2166]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.992000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe74d5a9b0 a2=0 a3=7ffe74d5a99c items=0 ppid=2074 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:38:59.993000 audit[2167]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.993000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4556b7b0 a2=0 a3=7fff4556b79c items=0 ppid=2074 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:38:59.995000 audit[2169]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.995000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb9b00740 a2=0 a3=7ffcb9b0072c items=0 ppid=2074 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:38:59.996000 audit[2170]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.996000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe942213e0 a2=0 a3=7ffe942213cc items=0 ppid=2074 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:38:59.998000 audit[2172]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:38:59.998000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffba18c4e0 a2=0 a3=7fffba18c4cc items=0 ppid=2074 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:38:59.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:39:00.000000 audit[2175]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:00.000000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce0e1e690 a2=0 a3=7ffce0e1e67c items=0 ppid=2074 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:39:00.005000 audit[2178]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:00.005000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa99ae140 a2=0 a3=7fffa99ae12c items=0 ppid=2074 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:39:00.005000 audit[2179]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:00.005000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd76bf4b80 a2=0 a3=7ffd76bf4b6c items=0 ppid=2074 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:39:00.007000 audit[2181]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:00.007000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc6b1e86a0 a2=0 a3=7ffc6b1e868c items=0 ppid=2074 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:39:00.010000 audit[2184]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:00.010000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd97b4d920 a2=0 a3=7ffd97b4d90c items=0 ppid=2074 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:39:00.011000 audit[2185]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:00.011000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcafa673c0 a2=0 a3=7ffcafa673ac items=0 ppid=2074 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:39:00.012000 audit[2187]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:39:00.012000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdfb226a00 a2=0 a3=7ffdfb2269ec items=0 ppid=2074 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:39:00.032000 audit[2193]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:00.032000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff3cfb96f0 a2=0 a3=7fff3cfb96dc items=0 ppid=2074 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.032000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:00.042000 audit[2193]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:00.042000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff3cfb96f0 a2=0 a3=7fff3cfb96dc items=0 ppid=2074 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:00.043000 audit[2198]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.043000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc146ac2a0 a2=0 a3=7ffc146ac28c items=0 ppid=2074 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:39:00.045000 audit[2200]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.045000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff011f0360 a2=0 a3=7fff011f034c items=0 ppid=2074 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:39:00.047000 audit[2203]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.047000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde6f87c70 a2=0 a3=7ffde6f87c5c items=0 ppid=2074 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:39:00.048000 audit[2204]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.048000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc29fd14d0 a2=0 a3=7ffc29fd14bc items=0 ppid=2074 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:39:00.050000 audit[2206]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.050000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce85e76d0 a2=0 a3=7ffce85e76bc items=0 ppid=2074 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:39:00.051000 audit[2207]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.051000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2554e0a0 a2=0 a3=7fff2554e08c items=0 ppid=2074 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:39:00.053000 audit[2209]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.053000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdbb334cb0 a2=0 a3=7ffdbb334c9c items=0 ppid=2074 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:39:00.056000 audit[2212]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.056000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd6e0fb590 a2=0 a3=7ffd6e0fb57c items=0 ppid=2074 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:39:00.056000 audit[2213]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.056000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8c407010 a2=0 a3=7ffe8c406ffc items=0 ppid=2074 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:39:00.058000 audit[2215]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.058000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3e43cc30 a2=0 a3=7ffc3e43cc1c items=0 ppid=2074 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:39:00.059000 audit[2216]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.059000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef984dfc0 a2=0 a3=7ffef984dfac items=0 ppid=2074 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:39:00.061000 audit[2218]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.061000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec7514e90 a2=0 a3=7ffec7514e7c items=0 ppid=2074 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:39:00.064000 audit[2221]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.064000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3f94f840 a2=0 a3=7ffd3f94f82c items=0 ppid=2074 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:39:00.066000 audit[2224]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.066000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcbbfcf150 a2=0 a3=7ffcbbfcf13c items=0 ppid=2074 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:39:00.067000 audit[2225]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.067000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd7aa3a030 a2=0 a3=7ffd7aa3a01c items=0 ppid=2074 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:39:00.069000 audit[2227]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.069000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc796bf400 a2=0 a3=7ffc796bf3ec items=0 ppid=2074 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:39:00.072000 audit[2230]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.072000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdb4fea230 a2=0 a3=7ffdb4fea21c items=0 ppid=2074 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:39:00.072000 audit[2231]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.072000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0ac8f180 a2=0 a3=7fff0ac8f16c items=0 ppid=2074 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:39:00.074000 audit[2233]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.074000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc909dc2e0 a2=0 a3=7ffc909dc2cc items=0 ppid=2074 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:39:00.075000 audit[2234]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.075000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd18a902f0 a2=0 a3=7ffd18a902dc items=0 ppid=2074 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:39:00.077000 audit[2236]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.077000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8eb01520 a2=0 a3=7ffe8eb0150c items=0 ppid=2074 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:39:00.079000 audit[2239]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:39:00.079000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffddc57e680 a2=0 a3=7ffddc57e66c items=0 ppid=2074 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:39:00.082000 audit[2241]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:39:00.082000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffff67492d0 a2=0 a3=7ffff67492bc items=0 ppid=2074 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.082000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:00.082000 audit[2241]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:39:00.082000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffff67492d0 a2=0 a3=7ffff67492bc items=0 ppid=2074 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.082000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:00.115199 env[1204]: time="2025-05-13T00:39:00.115158348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-gsm44,Uid:7d7f0180-3bf6-450b-b82b-316d6db5b4c7,Namespace:tigera-operator,Attempt:0,}" May 13 00:39:00.132653 env[1204]: time="2025-05-13T00:39:00.132530848Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:00.132653 env[1204]: time="2025-05-13T00:39:00.132572858Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:00.132653 env[1204]: time="2025-05-13T00:39:00.132582758Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:00.132780 env[1204]: time="2025-05-13T00:39:00.132712123Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae54a435aa9795e01d694372ac040e7e5c6d235521d44b9e3c25bf0e32c504a4 pid=2250 runtime=io.containerd.runc.v2 May 13 00:39:00.142639 systemd[1]: Started cri-containerd-ae54a435aa9795e01d694372ac040e7e5c6d235521d44b9e3c25bf0e32c504a4.scope. May 13 00:39:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.151000 audit: BPF prog-id=110 op=LOAD May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2250 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353461343335616139373935653031643639343337326163303430 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2250 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353461343335616139373935653031643639343337326163303430 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit: BPF prog-id=111 op=LOAD May 13 00:39:00.152000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003c26f0 items=0 ppid=2250 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353461343335616139373935653031643639343337326163303430 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit: BPF prog-id=112 op=LOAD May 13 00:39:00.152000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003c2738 items=0 ppid=2250 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353461343335616139373935653031643639343337326163303430 May 13 00:39:00.152000 audit: BPF prog-id=112 op=UNLOAD May 13 00:39:00.152000 audit: BPF prog-id=111 op=UNLOAD May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:00.152000 audit: BPF prog-id=113 op=LOAD May 13 00:39:00.152000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c2b48 items=0 ppid=2250 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:00.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353461343335616139373935653031643639343337326163303430 May 13 00:39:00.178741 env[1204]: time="2025-05-13T00:39:00.178693714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-gsm44,Uid:7d7f0180-3bf6-450b-b82b-316d6db5b4c7,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ae54a435aa9795e01d694372ac040e7e5c6d235521d44b9e3c25bf0e32c504a4\"" May 13 00:39:00.180293 env[1204]: time="2025-05-13T00:39:00.180265609Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 00:39:00.512696 kubelet[1946]: E0513 00:39:00.512654 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:00.512876 kubelet[1946]: E0513 00:39:00.512852 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:02.158636 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1372756998.mount: Deactivated successfully. May 13 00:39:03.271048 env[1204]: time="2025-05-13T00:39:03.271001099Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:03.272957 env[1204]: time="2025-05-13T00:39:03.272931838Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:03.274653 env[1204]: time="2025-05-13T00:39:03.274617682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:03.276056 env[1204]: time="2025-05-13T00:39:03.276029284Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:03.276499 env[1204]: time="2025-05-13T00:39:03.276463669Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 13 00:39:03.279051 env[1204]: time="2025-05-13T00:39:03.279016040Z" level=info msg="CreateContainer within sandbox \"ae54a435aa9795e01d694372ac040e7e5c6d235521d44b9e3c25bf0e32c504a4\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 00:39:03.290454 env[1204]: time="2025-05-13T00:39:03.290405903Z" level=info msg="CreateContainer within sandbox \"ae54a435aa9795e01d694372ac040e7e5c6d235521d44b9e3c25bf0e32c504a4\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a60e6cc6cf3d843621b9f9ffab5996f98cb90ad902dda0aa7fe749d9095db4bd\"" May 13 00:39:03.291855 env[1204]: time="2025-05-13T00:39:03.290923807Z" level=info msg="StartContainer for \"a60e6cc6cf3d843621b9f9ffab5996f98cb90ad902dda0aa7fe749d9095db4bd\"" May 13 00:39:03.308910 systemd[1]: Started cri-containerd-a60e6cc6cf3d843621b9f9ffab5996f98cb90ad902dda0aa7fe749d9095db4bd.scope. May 13 00:39:03.318928 kernel: kauditd_printk_skb: 308 callbacks suppressed May 13 00:39:03.319047 kernel: audit: type=1400 audit(1747096743.316:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.325420 kernel: audit: type=1400 audit(1747096743.316:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.325526 kernel: audit: type=1400 audit(1747096743.316:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.332783 kernel: audit: type=1400 audit(1747096743.316:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.332832 kernel: audit: type=1400 audit(1747096743.316:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.340046 kernel: audit: type=1400 audit(1747096743.316:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.340093 kernel: audit: type=1400 audit(1747096743.316:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.340612 kubelet[1946]: E0513 00:39:03.340588 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:03.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.347460 kernel: audit: type=1400 audit(1747096743.316:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.347527 kernel: audit: type=1400 audit(1747096743.316:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.355255 kernel: audit: type=1400 audit(1747096743.320:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.355515 kubelet[1946]: I0513 00:39:03.355433 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-52nv8" podStartSLOduration=4.355413715 podStartE2EDuration="4.355413715s" podCreationTimestamp="2025-05-13 00:38:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:39:00.526739192 +0000 UTC m=+6.153732430" watchObservedRunningTime="2025-05-13 00:39:03.355413715 +0000 UTC m=+8.982406963" May 13 00:39:03.320000 audit: BPF prog-id=114 op=LOAD May 13 00:39:03.321000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2250 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:03.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306536636336636633643834333632316239663966666162353939 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2250 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:03.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306536636336636633643834333632316239663966666162353939 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.321000 audit: BPF prog-id=115 op=LOAD May 13 00:39:03.321000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000342020 items=0 ppid=2250 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:03.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306536636336636633643834333632316239663966666162353939 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.324000 audit: BPF prog-id=116 op=LOAD May 13 00:39:03.324000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000342068 items=0 ppid=2250 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:03.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306536636336636633643834333632316239663966666162353939 May 13 00:39:03.328000 audit: BPF prog-id=116 op=UNLOAD May 13 00:39:03.328000 audit: BPF prog-id=115 op=UNLOAD May 13 00:39:03.328000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:03.328000 audit: BPF prog-id=117 op=LOAD May 13 00:39:03.328000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000342478 items=0 ppid=2250 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:03.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306536636336636633643834333632316239663966666162353939 May 13 00:39:03.409567 env[1204]: time="2025-05-13T00:39:03.409503519Z" level=info msg="StartContainer for \"a60e6cc6cf3d843621b9f9ffab5996f98cb90ad902dda0aa7fe749d9095db4bd\" returns successfully" May 13 00:39:03.517871 kubelet[1946]: E0513 00:39:03.517794 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:06.035000 audit[2323]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:06.035000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffde6e173e0 a2=0 a3=7ffde6e173cc items=0 ppid=2074 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:06.039000 audit[2323]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:06.039000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde6e173e0 a2=0 a3=0 items=0 ppid=2074 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:06.049000 audit[2325]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:06.049000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff60ec5000 a2=0 a3=7fff60ec4fec items=0 ppid=2074 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.049000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:06.053000 audit[2325]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:06.053000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff60ec5000 a2=0 a3=0 items=0 ppid=2074 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:06.277845 kubelet[1946]: I0513 00:39:06.277767 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-gsm44" podStartSLOduration=4.180380097 podStartE2EDuration="7.277748473s" podCreationTimestamp="2025-05-13 00:38:59 +0000 UTC" firstStartedPulling="2025-05-13 00:39:00.179881327 +0000 UTC m=+5.806874575" lastFinishedPulling="2025-05-13 00:39:03.277249703 +0000 UTC m=+8.904242951" observedRunningTime="2025-05-13 00:39:03.537144429 +0000 UTC m=+9.164137677" watchObservedRunningTime="2025-05-13 00:39:06.277748473 +0000 UTC m=+11.904741722" May 13 00:39:06.282733 systemd[1]: Created slice kubepods-besteffort-pod0c22d187_fa9f_4530_b4f0_54945aef3fa3.slice. May 13 00:39:06.289116 systemd[1]: Created slice kubepods-besteffort-pod075b63f5_663f_4eb3_b3dd_93a3d36162df.slice. May 13 00:39:06.351375 kubelet[1946]: E0513 00:39:06.351331 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8vc4n" podUID="e3a12862-3ba4-45d9-a86a-f2a0e492dbe1" May 13 00:39:06.433293 kubelet[1946]: I0513 00:39:06.433248 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-flexvol-driver-host\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433293 kubelet[1946]: I0513 00:39:06.433296 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/075b63f5-663f-4eb3-b3dd-93a3d36162df-tigera-ca-bundle\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433504 kubelet[1946]: I0513 00:39:06.433324 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-cni-bin-dir\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433504 kubelet[1946]: I0513 00:39:06.433348 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-policysync\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433504 kubelet[1946]: I0513 00:39:06.433377 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-xtables-lock\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433504 kubelet[1946]: I0513 00:39:06.433399 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-var-lib-calico\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433504 kubelet[1946]: I0513 00:39:06.433429 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8jb6z\" (UniqueName: \"kubernetes.io/projected/075b63f5-663f-4eb3-b3dd-93a3d36162df-kube-api-access-8jb6z\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433633 kubelet[1946]: I0513 00:39:06.433452 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-var-run-calico\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433633 kubelet[1946]: I0513 00:39:06.433478 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-cni-log-dir\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433633 kubelet[1946]: I0513 00:39:06.433500 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0c22d187-fa9f-4530-b4f0-54945aef3fa3-typha-certs\") pod \"calico-typha-7d59ddddf6-xb5tp\" (UID: \"0c22d187-fa9f-4530-b4f0-54945aef3fa3\") " pod="calico-system/calico-typha-7d59ddddf6-xb5tp" May 13 00:39:06.433633 kubelet[1946]: I0513 00:39:06.433529 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/075b63f5-663f-4eb3-b3dd-93a3d36162df-node-certs\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433633 kubelet[1946]: I0513 00:39:06.433549 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-cni-net-dir\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.433749 kubelet[1946]: I0513 00:39:06.433572 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0c22d187-fa9f-4530-b4f0-54945aef3fa3-tigera-ca-bundle\") pod \"calico-typha-7d59ddddf6-xb5tp\" (UID: \"0c22d187-fa9f-4530-b4f0-54945aef3fa3\") " pod="calico-system/calico-typha-7d59ddddf6-xb5tp" May 13 00:39:06.433749 kubelet[1946]: I0513 00:39:06.433594 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6rh5z\" (UniqueName: \"kubernetes.io/projected/0c22d187-fa9f-4530-b4f0-54945aef3fa3-kube-api-access-6rh5z\") pod \"calico-typha-7d59ddddf6-xb5tp\" (UID: \"0c22d187-fa9f-4530-b4f0-54945aef3fa3\") " pod="calico-system/calico-typha-7d59ddddf6-xb5tp" May 13 00:39:06.433749 kubelet[1946]: I0513 00:39:06.433616 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/075b63f5-663f-4eb3-b3dd-93a3d36162df-lib-modules\") pod \"calico-node-9trjf\" (UID: \"075b63f5-663f-4eb3-b3dd-93a3d36162df\") " pod="calico-system/calico-node-9trjf" May 13 00:39:06.534271 kubelet[1946]: I0513 00:39:06.534230 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e3a12862-3ba4-45d9-a86a-f2a0e492dbe1-varrun\") pod \"csi-node-driver-8vc4n\" (UID: \"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1\") " pod="calico-system/csi-node-driver-8vc4n" May 13 00:39:06.534271 kubelet[1946]: I0513 00:39:06.534268 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e3a12862-3ba4-45d9-a86a-f2a0e492dbe1-registration-dir\") pod \"csi-node-driver-8vc4n\" (UID: \"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1\") " pod="calico-system/csi-node-driver-8vc4n" May 13 00:39:06.534476 kubelet[1946]: I0513 00:39:06.534404 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pcdsb\" (UniqueName: \"kubernetes.io/projected/e3a12862-3ba4-45d9-a86a-f2a0e492dbe1-kube-api-access-pcdsb\") pod \"csi-node-driver-8vc4n\" (UID: \"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1\") " pod="calico-system/csi-node-driver-8vc4n" May 13 00:39:06.534514 kubelet[1946]: I0513 00:39:06.534488 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e3a12862-3ba4-45d9-a86a-f2a0e492dbe1-kubelet-dir\") pod \"csi-node-driver-8vc4n\" (UID: \"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1\") " pod="calico-system/csi-node-driver-8vc4n" May 13 00:39:06.534539 kubelet[1946]: I0513 00:39:06.534526 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e3a12862-3ba4-45d9-a86a-f2a0e492dbe1-socket-dir\") pod \"csi-node-driver-8vc4n\" (UID: \"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1\") " pod="calico-system/csi-node-driver-8vc4n" May 13 00:39:06.535488 kubelet[1946]: E0513 00:39:06.535466 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.535572 kubelet[1946]: W0513 00:39:06.535554 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.535667 kubelet[1946]: E0513 00:39:06.535651 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.536172 kubelet[1946]: E0513 00:39:06.535938 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.536172 kubelet[1946]: W0513 00:39:06.535957 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.536172 kubelet[1946]: E0513 00:39:06.535979 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.536414 kubelet[1946]: E0513 00:39:06.536391 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.536414 kubelet[1946]: W0513 00:39:06.536404 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.536500 kubelet[1946]: E0513 00:39:06.536418 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.536728 kubelet[1946]: E0513 00:39:06.536717 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.536804 kubelet[1946]: W0513 00:39:06.536788 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.536923 kubelet[1946]: E0513 00:39:06.536883 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.537117 kubelet[1946]: E0513 00:39:06.537105 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.537205 kubelet[1946]: W0513 00:39:06.537190 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.537341 kubelet[1946]: E0513 00:39:06.537313 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.541975 kubelet[1946]: E0513 00:39:06.537482 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.541975 kubelet[1946]: W0513 00:39:06.537497 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.541975 kubelet[1946]: E0513 00:39:06.537559 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.541975 kubelet[1946]: E0513 00:39:06.537652 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.541975 kubelet[1946]: W0513 00:39:06.537658 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.541975 kubelet[1946]: E0513 00:39:06.537666 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.541975 kubelet[1946]: E0513 00:39:06.537795 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.541975 kubelet[1946]: W0513 00:39:06.537802 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.541975 kubelet[1946]: E0513 00:39:06.537811 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.541975 kubelet[1946]: E0513 00:39:06.537946 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.542388 kubelet[1946]: W0513 00:39:06.537952 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.542388 kubelet[1946]: E0513 00:39:06.537959 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.542388 kubelet[1946]: E0513 00:39:06.538094 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.542388 kubelet[1946]: W0513 00:39:06.538102 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.542388 kubelet[1946]: E0513 00:39:06.538110 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.542388 kubelet[1946]: E0513 00:39:06.538310 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.542388 kubelet[1946]: W0513 00:39:06.538317 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.542388 kubelet[1946]: E0513 00:39:06.538325 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.542388 kubelet[1946]: E0513 00:39:06.538459 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.542388 kubelet[1946]: W0513 00:39:06.538467 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.542691 kubelet[1946]: E0513 00:39:06.538476 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.542691 kubelet[1946]: E0513 00:39:06.538626 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.542691 kubelet[1946]: W0513 00:39:06.538634 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.542691 kubelet[1946]: E0513 00:39:06.538642 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.542691 kubelet[1946]: E0513 00:39:06.539336 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.542691 kubelet[1946]: W0513 00:39:06.539343 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.542691 kubelet[1946]: E0513 00:39:06.539350 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.544208 kubelet[1946]: E0513 00:39:06.544193 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.544288 kubelet[1946]: W0513 00:39:06.544271 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.544391 kubelet[1946]: E0513 00:39:06.544356 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.550161 kubelet[1946]: E0513 00:39:06.550139 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.550161 kubelet[1946]: W0513 00:39:06.550157 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.550264 kubelet[1946]: E0513 00:39:06.550175 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.586286 kubelet[1946]: E0513 00:39:06.586267 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:06.586791 env[1204]: time="2025-05-13T00:39:06.586742625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d59ddddf6-xb5tp,Uid:0c22d187-fa9f-4530-b4f0-54945aef3fa3,Namespace:calico-system,Attempt:0,}" May 13 00:39:06.592002 kubelet[1946]: E0513 00:39:06.591985 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:06.592489 env[1204]: time="2025-05-13T00:39:06.592452342Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9trjf,Uid:075b63f5-663f-4eb3-b3dd-93a3d36162df,Namespace:calico-system,Attempt:0,}" May 13 00:39:06.635429 kubelet[1946]: E0513 00:39:06.635394 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.635429 kubelet[1946]: W0513 00:39:06.635415 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.635429 kubelet[1946]: E0513 00:39:06.635435 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.635696 kubelet[1946]: E0513 00:39:06.635679 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.635696 kubelet[1946]: W0513 00:39:06.635688 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.635746 kubelet[1946]: E0513 00:39:06.635701 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.635984 kubelet[1946]: E0513 00:39:06.635956 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.636019 kubelet[1946]: W0513 00:39:06.635986 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.636047 kubelet[1946]: E0513 00:39:06.636028 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.636213 kubelet[1946]: E0513 00:39:06.636200 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.636213 kubelet[1946]: W0513 00:39:06.636210 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.636280 kubelet[1946]: E0513 00:39:06.636223 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.636504 kubelet[1946]: E0513 00:39:06.636468 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.636504 kubelet[1946]: W0513 00:39:06.636497 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.636555 kubelet[1946]: E0513 00:39:06.636524 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.636687 kubelet[1946]: E0513 00:39:06.636674 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.636687 kubelet[1946]: W0513 00:39:06.636685 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.636736 kubelet[1946]: E0513 00:39:06.636697 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.636855 kubelet[1946]: E0513 00:39:06.636842 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.636855 kubelet[1946]: W0513 00:39:06.636852 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.636915 kubelet[1946]: E0513 00:39:06.636863 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.637070 kubelet[1946]: E0513 00:39:06.637058 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.637070 kubelet[1946]: W0513 00:39:06.637068 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.637130 kubelet[1946]: E0513 00:39:06.637080 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.637281 kubelet[1946]: E0513 00:39:06.637267 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.637281 kubelet[1946]: W0513 00:39:06.637280 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.637363 kubelet[1946]: E0513 00:39:06.637293 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.637455 kubelet[1946]: E0513 00:39:06.637446 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.637455 kubelet[1946]: W0513 00:39:06.637453 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.637518 kubelet[1946]: E0513 00:39:06.637504 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.637624 kubelet[1946]: E0513 00:39:06.637616 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.637649 kubelet[1946]: W0513 00:39:06.637634 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.637672 kubelet[1946]: E0513 00:39:06.637658 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.637804 kubelet[1946]: E0513 00:39:06.637786 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.637829 kubelet[1946]: W0513 00:39:06.637804 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.637854 kubelet[1946]: E0513 00:39:06.637826 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.637998 kubelet[1946]: E0513 00:39:06.637987 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.637998 kubelet[1946]: W0513 00:39:06.637995 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.638066 kubelet[1946]: E0513 00:39:06.638006 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.638180 kubelet[1946]: E0513 00:39:06.638168 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.638180 kubelet[1946]: W0513 00:39:06.638176 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.638234 kubelet[1946]: E0513 00:39:06.638188 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.638354 kubelet[1946]: E0513 00:39:06.638338 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.638354 kubelet[1946]: W0513 00:39:06.638350 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.638429 kubelet[1946]: E0513 00:39:06.638365 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.638547 kubelet[1946]: E0513 00:39:06.638536 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.638547 kubelet[1946]: W0513 00:39:06.638544 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.638603 kubelet[1946]: E0513 00:39:06.638555 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.638702 kubelet[1946]: E0513 00:39:06.638690 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.638702 kubelet[1946]: W0513 00:39:06.638698 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.638775 kubelet[1946]: E0513 00:39:06.638709 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.638890 kubelet[1946]: E0513 00:39:06.638879 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.638890 kubelet[1946]: W0513 00:39:06.638887 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.638960 kubelet[1946]: E0513 00:39:06.638921 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.639046 kubelet[1946]: E0513 00:39:06.639036 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.639071 kubelet[1946]: W0513 00:39:06.639045 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.639096 kubelet[1946]: E0513 00:39:06.639069 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.639212 kubelet[1946]: E0513 00:39:06.639203 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.639240 kubelet[1946]: W0513 00:39:06.639211 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.639240 kubelet[1946]: E0513 00:39:06.639223 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.639380 kubelet[1946]: E0513 00:39:06.639366 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.639380 kubelet[1946]: W0513 00:39:06.639374 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.639449 kubelet[1946]: E0513 00:39:06.639386 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.639602 kubelet[1946]: E0513 00:39:06.639591 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.639602 kubelet[1946]: W0513 00:39:06.639599 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.639649 kubelet[1946]: E0513 00:39:06.639611 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.639808 kubelet[1946]: E0513 00:39:06.639789 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.639808 kubelet[1946]: W0513 00:39:06.639805 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.639881 kubelet[1946]: E0513 00:39:06.639817 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.640030 kubelet[1946]: E0513 00:39:06.640016 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.640030 kubelet[1946]: W0513 00:39:06.640028 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.640089 kubelet[1946]: E0513 00:39:06.640037 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.640270 kubelet[1946]: E0513 00:39:06.640253 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.640270 kubelet[1946]: W0513 00:39:06.640265 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.640335 kubelet[1946]: E0513 00:39:06.640273 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.650602 kubelet[1946]: E0513 00:39:06.650572 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:06.650602 kubelet[1946]: W0513 00:39:06.650589 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:06.650602 kubelet[1946]: E0513 00:39:06.650605 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:06.723583 env[1204]: time="2025-05-13T00:39:06.723509534Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:06.723583 env[1204]: time="2025-05-13T00:39:06.723551112Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:06.725046 env[1204]: time="2025-05-13T00:39:06.723760690Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:06.725046 env[1204]: time="2025-05-13T00:39:06.724037274Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d05af85c47239fb814f492993b8072055fae80f8ead22f19d9b8e9a62b3a3e54 pid=2380 runtime=io.containerd.runc.v2 May 13 00:39:06.733764 env[1204]: time="2025-05-13T00:39:06.733685448Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:06.733764 env[1204]: time="2025-05-13T00:39:06.733725625Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:06.733764 env[1204]: time="2025-05-13T00:39:06.733735092Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:06.733993 env[1204]: time="2025-05-13T00:39:06.733846804Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799 pid=2402 runtime=io.containerd.runc.v2 May 13 00:39:06.734693 systemd[1]: Started cri-containerd-d05af85c47239fb814f492993b8072055fae80f8ead22f19d9b8e9a62b3a3e54.scope. May 13 00:39:06.744075 systemd[1]: Started cri-containerd-6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799.scope. May 13 00:39:06.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit: BPF prog-id=118 op=LOAD May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356166383563343732333966623831346634393239393362383037 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356166383563343732333966623831346634393239393362383037 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit: BPF prog-id=119 op=LOAD May 13 00:39:06.749000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000396cd0 items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356166383563343732333966623831346634393239393362383037 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit: BPF prog-id=120 op=LOAD May 13 00:39:06.749000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000396d18 items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356166383563343732333966623831346634393239393362383037 May 13 00:39:06.749000 audit: BPF prog-id=120 op=UNLOAD May 13 00:39:06.749000 audit: BPF prog-id=119 op=UNLOAD May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.749000 audit: BPF prog-id=121 op=LOAD May 13 00:39:06.749000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000397128 items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356166383563343732333966623831346634393239393362383037 May 13 00:39:06.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.756000 audit: BPF prog-id=122 op=LOAD May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2402 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323264303962633231343661386166346665656337326132343230 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2402 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323264303962633231343661386166346665656337326132343230 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit: BPF prog-id=123 op=LOAD May 13 00:39:06.757000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000289520 items=0 ppid=2402 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323264303962633231343661386166346665656337326132343230 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.757000 audit: BPF prog-id=124 op=LOAD May 13 00:39:06.757000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000289568 items=0 ppid=2402 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323264303962633231343661386166346665656337326132343230 May 13 00:39:06.757000 audit: BPF prog-id=124 op=UNLOAD May 13 00:39:06.757000 audit: BPF prog-id=123 op=UNLOAD May 13 00:39:06.758000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { perfmon } for pid=2415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit[2415]: AVC avc: denied { bpf } for pid=2415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:06.758000 audit: BPF prog-id=125 op=LOAD May 13 00:39:06.758000 audit[2415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000289978 items=0 ppid=2402 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:06.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323264303962633231343661386166346665656337326132343230 May 13 00:39:06.768435 env[1204]: time="2025-05-13T00:39:06.768386132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9trjf,Uid:075b63f5-663f-4eb3-b3dd-93a3d36162df,Namespace:calico-system,Attempt:0,} returns sandbox id \"6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799\"" May 13 00:39:06.769160 kubelet[1946]: E0513 00:39:06.769135 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:06.770073 env[1204]: time="2025-05-13T00:39:06.770037073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:39:06.776376 env[1204]: time="2025-05-13T00:39:06.776317751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d59ddddf6-xb5tp,Uid:0c22d187-fa9f-4530-b4f0-54945aef3fa3,Namespace:calico-system,Attempt:0,} returns sandbox id \"d05af85c47239fb814f492993b8072055fae80f8ead22f19d9b8e9a62b3a3e54\"" May 13 00:39:06.777247 kubelet[1946]: E0513 00:39:06.777186 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:07.062000 audit[2456]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:07.062000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffddb6a150 a2=0 a3=7fffddb6a13c items=0 ppid=2074 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:07.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:07.077000 audit[2456]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:07.077000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffddb6a150 a2=0 a3=0 items=0 ppid=2074 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:07.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:07.198544 kubelet[1946]: E0513 00:39:07.198512 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:07.239936 kubelet[1946]: E0513 00:39:07.239891 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.239936 kubelet[1946]: W0513 00:39:07.239929 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.240182 kubelet[1946]: E0513 00:39:07.239956 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.240238 kubelet[1946]: E0513 00:39:07.240223 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.240276 kubelet[1946]: W0513 00:39:07.240238 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.240276 kubelet[1946]: E0513 00:39:07.240251 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.240457 kubelet[1946]: E0513 00:39:07.240436 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.240457 kubelet[1946]: W0513 00:39:07.240449 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.240522 kubelet[1946]: E0513 00:39:07.240459 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.240654 kubelet[1946]: E0513 00:39:07.240641 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.240654 kubelet[1946]: W0513 00:39:07.240653 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.240730 kubelet[1946]: E0513 00:39:07.240664 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.240868 kubelet[1946]: E0513 00:39:07.240847 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.240868 kubelet[1946]: W0513 00:39:07.240859 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.240945 kubelet[1946]: E0513 00:39:07.240870 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.241064 kubelet[1946]: E0513 00:39:07.241049 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.241064 kubelet[1946]: W0513 00:39:07.241060 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.241150 kubelet[1946]: E0513 00:39:07.241073 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.241258 kubelet[1946]: E0513 00:39:07.241245 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.241299 kubelet[1946]: W0513 00:39:07.241259 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.241299 kubelet[1946]: E0513 00:39:07.241269 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.241465 kubelet[1946]: E0513 00:39:07.241449 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.241465 kubelet[1946]: W0513 00:39:07.241462 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.241548 kubelet[1946]: E0513 00:39:07.241473 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.241666 kubelet[1946]: E0513 00:39:07.241652 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.241666 kubelet[1946]: W0513 00:39:07.241663 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.241763 kubelet[1946]: E0513 00:39:07.241673 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.241923 kubelet[1946]: E0513 00:39:07.241886 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.241923 kubelet[1946]: W0513 00:39:07.241917 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.242018 kubelet[1946]: E0513 00:39:07.241936 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.242152 kubelet[1946]: E0513 00:39:07.242117 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.242152 kubelet[1946]: W0513 00:39:07.242143 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.242152 kubelet[1946]: E0513 00:39:07.242156 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.242369 kubelet[1946]: E0513 00:39:07.242335 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.242369 kubelet[1946]: W0513 00:39:07.242345 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.242369 kubelet[1946]: E0513 00:39:07.242355 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.242553 kubelet[1946]: E0513 00:39:07.242537 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.242553 kubelet[1946]: W0513 00:39:07.242551 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.242623 kubelet[1946]: E0513 00:39:07.242561 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.242732 kubelet[1946]: E0513 00:39:07.242714 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.242732 kubelet[1946]: W0513 00:39:07.242728 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.242798 kubelet[1946]: E0513 00:39:07.242739 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.242911 kubelet[1946]: E0513 00:39:07.242888 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.242955 kubelet[1946]: W0513 00:39:07.242944 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.243002 kubelet[1946]: E0513 00:39:07.242959 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.243139 kubelet[1946]: E0513 00:39:07.243115 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.243139 kubelet[1946]: W0513 00:39:07.243138 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.243190 kubelet[1946]: E0513 00:39:07.243148 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.243372 kubelet[1946]: E0513 00:39:07.243352 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.243372 kubelet[1946]: W0513 00:39:07.243370 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.243447 kubelet[1946]: E0513 00:39:07.243381 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.243577 kubelet[1946]: E0513 00:39:07.243553 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.243577 kubelet[1946]: W0513 00:39:07.243566 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.243698 kubelet[1946]: E0513 00:39:07.243575 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.243784 kubelet[1946]: E0513 00:39:07.243765 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.243784 kubelet[1946]: W0513 00:39:07.243784 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.243879 kubelet[1946]: E0513 00:39:07.243798 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.244030 kubelet[1946]: E0513 00:39:07.244011 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.244030 kubelet[1946]: W0513 00:39:07.244026 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.244096 kubelet[1946]: E0513 00:39:07.244038 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.244257 kubelet[1946]: E0513 00:39:07.244239 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.244257 kubelet[1946]: W0513 00:39:07.244251 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.244354 kubelet[1946]: E0513 00:39:07.244262 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.244527 kubelet[1946]: E0513 00:39:07.244434 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.244527 kubelet[1946]: W0513 00:39:07.244441 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.244527 kubelet[1946]: E0513 00:39:07.244447 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.244620 kubelet[1946]: E0513 00:39:07.244596 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.244620 kubelet[1946]: W0513 00:39:07.244602 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.244620 kubelet[1946]: E0513 00:39:07.244609 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.244775 kubelet[1946]: E0513 00:39:07.244762 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.244775 kubelet[1946]: W0513 00:39:07.244771 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.244824 kubelet[1946]: E0513 00:39:07.244777 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:07.244949 kubelet[1946]: E0513 00:39:07.244930 1946 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:39:07.244949 kubelet[1946]: W0513 00:39:07.244942 1946 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:39:07.244949 kubelet[1946]: E0513 00:39:07.244949 1946 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:39:08.187178 update_engine[1199]: I0513 00:39:08.187103 1199 update_attempter.cc:509] Updating boot flags... May 13 00:39:08.485962 kubelet[1946]: E0513 00:39:08.485796 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8vc4n" podUID="e3a12862-3ba4-45d9-a86a-f2a0e492dbe1" May 13 00:39:08.511414 env[1204]: time="2025-05-13T00:39:08.511355969Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:08.513768 env[1204]: time="2025-05-13T00:39:08.513734163Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:08.515754 env[1204]: time="2025-05-13T00:39:08.515718060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:08.517817 env[1204]: time="2025-05-13T00:39:08.517773763Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:08.518177 env[1204]: time="2025-05-13T00:39:08.518143443Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 00:39:08.519585 env[1204]: time="2025-05-13T00:39:08.519388180Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 00:39:08.520544 env[1204]: time="2025-05-13T00:39:08.520511418Z" level=info msg="CreateContainer within sandbox \"6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:39:08.539478 env[1204]: time="2025-05-13T00:39:08.539421366Z" level=info msg="CreateContainer within sandbox \"6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73\"" May 13 00:39:08.540122 env[1204]: time="2025-05-13T00:39:08.540067360Z" level=info msg="StartContainer for \"d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73\"" May 13 00:39:08.568406 systemd[1]: run-containerd-runc-k8s.io-d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73-runc.eGwUuw.mount: Deactivated successfully. May 13 00:39:08.569989 systemd[1]: Started cri-containerd-d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73.scope. May 13 00:39:08.584000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.586007 kernel: kauditd_printk_skb: 179 callbacks suppressed May 13 00:39:08.586066 kernel: audit: type=1400 audit(1747096748.584:967): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe32827a6c8 items=0 ppid=2402 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:08.593929 kernel: audit: type=1300 audit(1747096748.584:967): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe32827a6c8 items=0 ppid=2402 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:08.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431396261633363353835333430656161663032656364666232343532 May 13 00:39:08.598576 kernel: audit: type=1327 audit(1747096748.584:967): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431396261633363353835333430656161663032656364666232343532 May 13 00:39:08.598722 kernel: audit: type=1400 audit(1747096748.584:968): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.604626 kernel: audit: type=1400 audit(1747096748.584:968): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.607648 kernel: audit: type=1400 audit(1747096748.584:968): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.610666 kernel: audit: type=1400 audit(1747096748.584:968): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.610732 kernel: audit: type=1400 audit(1747096748.584:968): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.617185 kernel: audit: type=1400 audit(1747096748.584:968): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.617263 kernel: audit: type=1400 audit(1747096748.584:968): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.618093 env[1204]: time="2025-05-13T00:39:08.618029605Z" level=info msg="StartContainer for \"d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73\" returns successfully" May 13 00:39:08.584000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.584000 audit: BPF prog-id=126 op=LOAD May 13 00:39:08.584000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002cdba8 items=0 ppid=2402 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:08.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431396261633363353835333430656161663032656364666232343532 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.588000 audit: BPF prog-id=127 op=LOAD May 13 00:39:08.588000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002cdbf8 items=0 ppid=2402 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:08.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431396261633363353835333430656161663032656364666232343532 May 13 00:39:08.593000 audit: BPF prog-id=127 op=UNLOAD May 13 00:39:08.593000 audit: BPF prog-id=126 op=UNLOAD May 13 00:39:08.593000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:08.593000 audit: BPF prog-id=128 op=LOAD May 13 00:39:08.593000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002cdc88 items=0 ppid=2402 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:08.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431396261633363353835333430656161663032656364666232343532 May 13 00:39:08.626179 systemd[1]: cri-containerd-d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73.scope: Deactivated successfully. May 13 00:39:08.629000 audit: BPF prog-id=128 op=UNLOAD May 13 00:39:08.649143 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73-rootfs.mount: Deactivated successfully. May 13 00:39:08.696711 env[1204]: time="2025-05-13T00:39:08.696640359Z" level=info msg="shim disconnected" id=d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73 May 13 00:39:08.696711 env[1204]: time="2025-05-13T00:39:08.696693259Z" level=warning msg="cleaning up after shim disconnected" id=d19bac3c585340eaaf02ecdfb24529f3f39efe9751724d3e65194a2f901b8b73 namespace=k8s.io May 13 00:39:08.696711 env[1204]: time="2025-05-13T00:39:08.696707677Z" level=info msg="cleaning up dead shim" May 13 00:39:08.702977 env[1204]: time="2025-05-13T00:39:08.702916124Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:39:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2542 runtime=io.containerd.runc.v2\n" May 13 00:39:09.529136 kubelet[1946]: E0513 00:39:09.529085 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:10.485595 kubelet[1946]: E0513 00:39:10.485512 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8vc4n" podUID="e3a12862-3ba4-45d9-a86a-f2a0e492dbe1" May 13 00:39:11.423203 env[1204]: time="2025-05-13T00:39:11.423135629Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:11.425517 env[1204]: time="2025-05-13T00:39:11.425484520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:11.427112 env[1204]: time="2025-05-13T00:39:11.427042345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:11.428420 env[1204]: time="2025-05-13T00:39:11.428366780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:11.428807 env[1204]: time="2025-05-13T00:39:11.428770332Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 13 00:39:11.429880 env[1204]: time="2025-05-13T00:39:11.429849483Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:39:11.438673 env[1204]: time="2025-05-13T00:39:11.438627819Z" level=info msg="CreateContainer within sandbox \"d05af85c47239fb814f492993b8072055fae80f8ead22f19d9b8e9a62b3a3e54\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 00:39:11.453562 env[1204]: time="2025-05-13T00:39:11.453486161Z" level=info msg="CreateContainer within sandbox \"d05af85c47239fb814f492993b8072055fae80f8ead22f19d9b8e9a62b3a3e54\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8a8b89d6c50b83e9e58a5ae9912258f9234695d69a9848c75cc09fbad6c5cfc0\"" May 13 00:39:11.454142 env[1204]: time="2025-05-13T00:39:11.454113597Z" level=info msg="StartContainer for \"8a8b89d6c50b83e9e58a5ae9912258f9234695d69a9848c75cc09fbad6c5cfc0\"" May 13 00:39:11.471156 systemd[1]: Started cri-containerd-8a8b89d6c50b83e9e58a5ae9912258f9234695d69a9848c75cc09fbad6c5cfc0.scope. May 13 00:39:11.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit: BPF prog-id=129 op=LOAD May 13 00:39:11.483000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2380 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:11.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386238396436633530623833653965353861356165393931323235 May 13 00:39:11.483000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.483000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2380 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:11.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386238396436633530623833653965353861356165393931323235 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit: BPF prog-id=130 op=LOAD May 13 00:39:11.484000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00034dde0 items=0 ppid=2380 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:11.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386238396436633530623833653965353861356165393931323235 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit: BPF prog-id=131 op=LOAD May 13 00:39:11.484000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00034de28 items=0 ppid=2380 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:11.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386238396436633530623833653965353861356165393931323235 May 13 00:39:11.484000 audit: BPF prog-id=131 op=UNLOAD May 13 00:39:11.484000 audit: BPF prog-id=130 op=UNLOAD May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:11.484000 audit: BPF prog-id=132 op=LOAD May 13 00:39:11.484000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b8238 items=0 ppid=2380 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:11.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861386238396436633530623833653965353861356165393931323235 May 13 00:39:11.508549 env[1204]: time="2025-05-13T00:39:11.508484213Z" level=info msg="StartContainer for \"8a8b89d6c50b83e9e58a5ae9912258f9234695d69a9848c75cc09fbad6c5cfc0\" returns successfully" May 13 00:39:11.534654 kubelet[1946]: E0513 00:39:11.534261 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:11.547428 kubelet[1946]: I0513 00:39:11.547360 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7d59ddddf6-xb5tp" podStartSLOduration=0.895306513 podStartE2EDuration="5.547341608s" podCreationTimestamp="2025-05-13 00:39:06 +0000 UTC" firstStartedPulling="2025-05-13 00:39:06.777662912 +0000 UTC m=+12.404656160" lastFinishedPulling="2025-05-13 00:39:11.429698007 +0000 UTC m=+17.056691255" observedRunningTime="2025-05-13 00:39:11.546778884 +0000 UTC m=+17.173772152" watchObservedRunningTime="2025-05-13 00:39:11.547341608 +0000 UTC m=+17.174334856" May 13 00:39:12.485377 kubelet[1946]: E0513 00:39:12.485296 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8vc4n" podUID="e3a12862-3ba4-45d9-a86a-f2a0e492dbe1" May 13 00:39:12.535786 kubelet[1946]: I0513 00:39:12.535750 1946 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:39:12.536194 kubelet[1946]: E0513 00:39:12.536174 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:14.485852 kubelet[1946]: E0513 00:39:14.485803 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8vc4n" podUID="e3a12862-3ba4-45d9-a86a-f2a0e492dbe1" May 13 00:39:16.488670 kubelet[1946]: E0513 00:39:16.488605 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8vc4n" podUID="e3a12862-3ba4-45d9-a86a-f2a0e492dbe1" May 13 00:39:16.862443 env[1204]: time="2025-05-13T00:39:16.862362398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:16.864711 env[1204]: time="2025-05-13T00:39:16.864644334Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:16.866754 env[1204]: time="2025-05-13T00:39:16.866688711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:16.868542 env[1204]: time="2025-05-13T00:39:16.868490641Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:16.868960 env[1204]: time="2025-05-13T00:39:16.868922476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 00:39:16.871774 env[1204]: time="2025-05-13T00:39:16.871705346Z" level=info msg="CreateContainer within sandbox \"6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:39:16.891974 env[1204]: time="2025-05-13T00:39:16.891893265Z" level=info msg="CreateContainer within sandbox \"6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"757a4d9957d40560e49ea9c724d0c3b6f438482acf71b3bc5bef9ae030bb7094\"" May 13 00:39:16.892820 env[1204]: time="2025-05-13T00:39:16.892749170Z" level=info msg="StartContainer for \"757a4d9957d40560e49ea9c724d0c3b6f438482acf71b3bc5bef9ae030bb7094\"" May 13 00:39:16.919071 systemd[1]: Started cri-containerd-757a4d9957d40560e49ea9c724d0c3b6f438482acf71b3bc5bef9ae030bb7094.scope. May 13 00:39:16.929000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.931870 kernel: kauditd_printk_skb: 91 callbacks suppressed May 13 00:39:16.931928 kernel: audit: type=1400 audit(1747096756.929:992): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9b3a2beea8 items=0 ppid=2402 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:16.941186 kernel: audit: type=1300 audit(1747096756.929:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9b3a2beea8 items=0 ppid=2402 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:16.941264 kernel: audit: type=1327 audit(1747096756.929:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376134643939353764343035363065343965613963373234643063 May 13 00:39:16.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376134643939353764343035363065343965613963373234643063 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.950646 kernel: audit: type=1400 audit(1747096756.929:993): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.950757 kernel: audit: type=1400 audit(1747096756.929:993): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.959322 kernel: audit: type=1400 audit(1747096756.929:993): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.959476 kernel: audit: type=1400 audit(1747096756.929:993): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.967176 kernel: audit: type=1400 audit(1747096756.929:993): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.967258 kernel: audit: type=1400 audit(1747096756.929:993): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.974333 env[1204]: time="2025-05-13T00:39:16.974286178Z" level=info msg="StartContainer for \"757a4d9957d40560e49ea9c724d0c3b6f438482acf71b3bc5bef9ae030bb7094\" returns successfully" May 13 00:39:16.929000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit: BPF prog-id=133 op=LOAD May 13 00:39:16.929000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000096878 items=0 ppid=2402 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:16.976157 kernel: audit: type=1400 audit(1747096756.929:993): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376134643939353764343035363065343965613963373234643063 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.940000 audit: BPF prog-id=134 op=LOAD May 13 00:39:16.940000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000968c8 items=0 ppid=2402 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:16.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376134643939353764343035363065343965613963373234643063 May 13 00:39:16.945000 audit: BPF prog-id=134 op=UNLOAD May 13 00:39:16.945000 audit: BPF prog-id=133 op=UNLOAD May 13 00:39:16.945000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:16.945000 audit: BPF prog-id=135 op=LOAD May 13 00:39:16.945000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000096958 items=0 ppid=2402 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:16.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376134643939353764343035363065343965613963373234643063 May 13 00:39:17.735348 kubelet[1946]: E0513 00:39:17.735302 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:17.949090 systemd[1]: cri-containerd-757a4d9957d40560e49ea9c724d0c3b6f438482acf71b3bc5bef9ae030bb7094.scope: Deactivated successfully. May 13 00:39:17.953000 audit: BPF prog-id=135 op=UNLOAD May 13 00:39:17.966815 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-757a4d9957d40560e49ea9c724d0c3b6f438482acf71b3bc5bef9ae030bb7094-rootfs.mount: Deactivated successfully. May 13 00:39:17.971323 kubelet[1946]: I0513 00:39:17.971291 1946 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 13 00:39:18.202639 kubelet[1946]: I0513 00:39:18.202603 1946 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:39:18.202921 kubelet[1946]: E0513 00:39:18.202872 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:18.208632 env[1204]: time="2025-05-13T00:39:18.208386594Z" level=info msg="shim disconnected" id=757a4d9957d40560e49ea9c724d0c3b6f438482acf71b3bc5bef9ae030bb7094 May 13 00:39:18.208632 env[1204]: time="2025-05-13T00:39:18.208445175Z" level=warning msg="cleaning up after shim disconnected" id=757a4d9957d40560e49ea9c724d0c3b6f438482acf71b3bc5bef9ae030bb7094 namespace=k8s.io May 13 00:39:18.208632 env[1204]: time="2025-05-13T00:39:18.208458069Z" level=info msg="cleaning up dead shim" May 13 00:39:18.210554 systemd[1]: Created slice kubepods-burstable-pod04d6ce06_a96b_4d68_aeab_4e281e1f4fcb.slice. May 13 00:39:18.216479 systemd[1]: Created slice kubepods-burstable-pod04b0ee45_cb91_41bd_b95a_6ad53709a896.slice. May 13 00:39:18.243023 systemd[1]: Created slice kubepods-besteffort-pod0a2a2bd3_12f7_4300_991c_bbe6ee3751df.slice. May 13 00:39:18.252138 systemd[1]: Created slice kubepods-besteffort-pod9012a999_4581_4546_b67f_ab4db466229c.slice. May 13 00:39:18.253829 env[1204]: time="2025-05-13T00:39:18.253784942Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:39:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2651 runtime=io.containerd.runc.v2\ntime=\"2025-05-13T00:39:18Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" May 13 00:39:18.257407 systemd[1]: Created slice kubepods-besteffort-podea02011d_117d_451e_84fb_5fdb7db708a7.slice. May 13 00:39:18.293000 audit[2665]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:18.293000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc5dcb45a0 a2=0 a3=7ffc5dcb458c items=0 ppid=2074 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:18.300000 audit[2665]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:18.300000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc5dcb45a0 a2=0 a3=7ffc5dcb458c items=0 ppid=2074 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:18.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:18.302662 kubelet[1946]: I0513 00:39:18.302624 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vmkr9\" (UniqueName: \"kubernetes.io/projected/04d6ce06-a96b-4d68-aeab-4e281e1f4fcb-kube-api-access-vmkr9\") pod \"coredns-6f6b679f8f-hpvlr\" (UID: \"04d6ce06-a96b-4d68-aeab-4e281e1f4fcb\") " pod="kube-system/coredns-6f6b679f8f-hpvlr" May 13 00:39:18.302662 kubelet[1946]: I0513 00:39:18.302665 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/04b0ee45-cb91-41bd-b95a-6ad53709a896-config-volume\") pod \"coredns-6f6b679f8f-xjvld\" (UID: \"04b0ee45-cb91-41bd-b95a-6ad53709a896\") " pod="kube-system/coredns-6f6b679f8f-xjvld" May 13 00:39:18.302662 kubelet[1946]: I0513 00:39:18.302682 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gcmnx\" (UniqueName: \"kubernetes.io/projected/9012a999-4581-4546-b67f-ab4db466229c-kube-api-access-gcmnx\") pod \"calico-apiserver-6bdf86dbbc-b4z98\" (UID: \"9012a999-4581-4546-b67f-ab4db466229c\") " pod="calico-apiserver/calico-apiserver-6bdf86dbbc-b4z98" May 13 00:39:18.302845 kubelet[1946]: I0513 00:39:18.302698 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xwl2s\" (UniqueName: \"kubernetes.io/projected/04b0ee45-cb91-41bd-b95a-6ad53709a896-kube-api-access-xwl2s\") pod \"coredns-6f6b679f8f-xjvld\" (UID: \"04b0ee45-cb91-41bd-b95a-6ad53709a896\") " pod="kube-system/coredns-6f6b679f8f-xjvld" May 13 00:39:18.302845 kubelet[1946]: I0513 00:39:18.302713 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ea02011d-117d-451e-84fb-5fdb7db708a7-tigera-ca-bundle\") pod \"calico-kube-controllers-75c768cf7-66sf4\" (UID: \"ea02011d-117d-451e-84fb-5fdb7db708a7\") " pod="calico-system/calico-kube-controllers-75c768cf7-66sf4" May 13 00:39:18.302845 kubelet[1946]: I0513 00:39:18.302726 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9012a999-4581-4546-b67f-ab4db466229c-calico-apiserver-certs\") pod \"calico-apiserver-6bdf86dbbc-b4z98\" (UID: \"9012a999-4581-4546-b67f-ab4db466229c\") " pod="calico-apiserver/calico-apiserver-6bdf86dbbc-b4z98" May 13 00:39:18.302845 kubelet[1946]: I0513 00:39:18.302740 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g89vr\" (UniqueName: \"kubernetes.io/projected/0a2a2bd3-12f7-4300-991c-bbe6ee3751df-kube-api-access-g89vr\") pod \"calico-apiserver-6bdf86dbbc-nhnf5\" (UID: \"0a2a2bd3-12f7-4300-991c-bbe6ee3751df\") " pod="calico-apiserver/calico-apiserver-6bdf86dbbc-nhnf5" May 13 00:39:18.302845 kubelet[1946]: I0513 00:39:18.302754 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/04d6ce06-a96b-4d68-aeab-4e281e1f4fcb-config-volume\") pod \"coredns-6f6b679f8f-hpvlr\" (UID: \"04d6ce06-a96b-4d68-aeab-4e281e1f4fcb\") " pod="kube-system/coredns-6f6b679f8f-hpvlr" May 13 00:39:18.303055 kubelet[1946]: I0513 00:39:18.302769 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkp45\" (UniqueName: \"kubernetes.io/projected/ea02011d-117d-451e-84fb-5fdb7db708a7-kube-api-access-lkp45\") pod \"calico-kube-controllers-75c768cf7-66sf4\" (UID: \"ea02011d-117d-451e-84fb-5fdb7db708a7\") " pod="calico-system/calico-kube-controllers-75c768cf7-66sf4" May 13 00:39:18.303055 kubelet[1946]: I0513 00:39:18.302785 1946 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0a2a2bd3-12f7-4300-991c-bbe6ee3751df-calico-apiserver-certs\") pod \"calico-apiserver-6bdf86dbbc-nhnf5\" (UID: \"0a2a2bd3-12f7-4300-991c-bbe6ee3751df\") " pod="calico-apiserver/calico-apiserver-6bdf86dbbc-nhnf5" May 13 00:39:18.490751 systemd[1]: Created slice kubepods-besteffort-pode3a12862_3ba4_45d9_a86a_f2a0e492dbe1.slice. May 13 00:39:18.494861 env[1204]: time="2025-05-13T00:39:18.494818886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8vc4n,Uid:e3a12862-3ba4-45d9-a86a-f2a0e492dbe1,Namespace:calico-system,Attempt:0,}" May 13 00:39:18.515292 kubelet[1946]: E0513 00:39:18.515267 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:18.515965 env[1204]: time="2025-05-13T00:39:18.515712962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hpvlr,Uid:04d6ce06-a96b-4d68-aeab-4e281e1f4fcb,Namespace:kube-system,Attempt:0,}" May 13 00:39:18.531252 kubelet[1946]: E0513 00:39:18.531225 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:18.531558 env[1204]: time="2025-05-13T00:39:18.531523522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xjvld,Uid:04b0ee45-cb91-41bd-b95a-6ad53709a896,Namespace:kube-system,Attempt:0,}" May 13 00:39:18.551640 env[1204]: time="2025-05-13T00:39:18.551590798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bdf86dbbc-nhnf5,Uid:0a2a2bd3-12f7-4300-991c-bbe6ee3751df,Namespace:calico-apiserver,Attempt:0,}" May 13 00:39:18.556085 env[1204]: time="2025-05-13T00:39:18.556048624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bdf86dbbc-b4z98,Uid:9012a999-4581-4546-b67f-ab4db466229c,Namespace:calico-apiserver,Attempt:0,}" May 13 00:39:18.559690 env[1204]: time="2025-05-13T00:39:18.559648631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-75c768cf7-66sf4,Uid:ea02011d-117d-451e-84fb-5fdb7db708a7,Namespace:calico-system,Attempt:0,}" May 13 00:39:18.748012 kubelet[1946]: E0513 00:39:18.747533 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:18.748012 kubelet[1946]: E0513 00:39:18.747543 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:18.749550 env[1204]: time="2025-05-13T00:39:18.749493649Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:39:18.787596 env[1204]: time="2025-05-13T00:39:18.787214551Z" level=error msg="Failed to destroy network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.788420 env[1204]: time="2025-05-13T00:39:18.788392933Z" level=error msg="encountered an error cleaning up failed sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.788529 env[1204]: time="2025-05-13T00:39:18.788500576Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bdf86dbbc-b4z98,Uid:9012a999-4581-4546-b67f-ab4db466229c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.789047 kubelet[1946]: E0513 00:39:18.788991 1946 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.789122 kubelet[1946]: E0513 00:39:18.789071 1946 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-b4z98" May 13 00:39:18.789122 kubelet[1946]: E0513 00:39:18.789093 1946 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-b4z98" May 13 00:39:18.789175 kubelet[1946]: E0513 00:39:18.789129 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6bdf86dbbc-b4z98_calico-apiserver(9012a999-4581-4546-b67f-ab4db466229c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6bdf86dbbc-b4z98_calico-apiserver(9012a999-4581-4546-b67f-ab4db466229c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-b4z98" podUID="9012a999-4581-4546-b67f-ab4db466229c" May 13 00:39:18.802504 env[1204]: time="2025-05-13T00:39:18.802438647Z" level=error msg="Failed to destroy network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.802804 env[1204]: time="2025-05-13T00:39:18.802776965Z" level=error msg="encountered an error cleaning up failed sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.802872 env[1204]: time="2025-05-13T00:39:18.802830826Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hpvlr,Uid:04d6ce06-a96b-4d68-aeab-4e281e1f4fcb,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.803080 kubelet[1946]: E0513 00:39:18.803044 1946 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.803159 kubelet[1946]: E0513 00:39:18.803098 1946 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-hpvlr" May 13 00:39:18.803159 kubelet[1946]: E0513 00:39:18.803116 1946 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-hpvlr" May 13 00:39:18.803212 kubelet[1946]: E0513 00:39:18.803149 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-hpvlr_kube-system(04d6ce06-a96b-4d68-aeab-4e281e1f4fcb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-hpvlr_kube-system(04d6ce06-a96b-4d68-aeab-4e281e1f4fcb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-hpvlr" podUID="04d6ce06-a96b-4d68-aeab-4e281e1f4fcb" May 13 00:39:18.826747 env[1204]: time="2025-05-13T00:39:18.826683419Z" level=error msg="Failed to destroy network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.827205 env[1204]: time="2025-05-13T00:39:18.827179064Z" level=error msg="encountered an error cleaning up failed sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.827322 env[1204]: time="2025-05-13T00:39:18.827292398Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bdf86dbbc-nhnf5,Uid:0a2a2bd3-12f7-4300-991c-bbe6ee3751df,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.827632 kubelet[1946]: E0513 00:39:18.827592 1946 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.827713 kubelet[1946]: E0513 00:39:18.827650 1946 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-nhnf5" May 13 00:39:18.827713 kubelet[1946]: E0513 00:39:18.827673 1946 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-nhnf5" May 13 00:39:18.827768 kubelet[1946]: E0513 00:39:18.827709 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6bdf86dbbc-nhnf5_calico-apiserver(0a2a2bd3-12f7-4300-991c-bbe6ee3751df)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6bdf86dbbc-nhnf5_calico-apiserver(0a2a2bd3-12f7-4300-991c-bbe6ee3751df)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-nhnf5" podUID="0a2a2bd3-12f7-4300-991c-bbe6ee3751df" May 13 00:39:18.835456 env[1204]: time="2025-05-13T00:39:18.835399363Z" level=error msg="Failed to destroy network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.835973 env[1204]: time="2025-05-13T00:39:18.835924193Z" level=error msg="encountered an error cleaning up failed sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.836040 env[1204]: time="2025-05-13T00:39:18.835995578Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xjvld,Uid:04b0ee45-cb91-41bd-b95a-6ad53709a896,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.836159 kubelet[1946]: E0513 00:39:18.836134 1946 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.836232 kubelet[1946]: E0513 00:39:18.836164 1946 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-xjvld" May 13 00:39:18.836232 kubelet[1946]: E0513 00:39:18.836182 1946 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-xjvld" May 13 00:39:18.836232 kubelet[1946]: E0513 00:39:18.836204 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-xjvld_kube-system(04b0ee45-cb91-41bd-b95a-6ad53709a896)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-xjvld_kube-system(04b0ee45-cb91-41bd-b95a-6ad53709a896)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xjvld" podUID="04b0ee45-cb91-41bd-b95a-6ad53709a896" May 13 00:39:18.840924 env[1204]: time="2025-05-13T00:39:18.840837357Z" level=error msg="Failed to destroy network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.841320 env[1204]: time="2025-05-13T00:39:18.841279049Z" level=error msg="encountered an error cleaning up failed sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.841375 env[1204]: time="2025-05-13T00:39:18.841346907Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8vc4n,Uid:e3a12862-3ba4-45d9-a86a-f2a0e492dbe1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.841651 kubelet[1946]: E0513 00:39:18.841587 1946 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.841707 kubelet[1946]: E0513 00:39:18.841656 1946 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8vc4n" May 13 00:39:18.841707 kubelet[1946]: E0513 00:39:18.841675 1946 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8vc4n" May 13 00:39:18.841759 kubelet[1946]: E0513 00:39:18.841722 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8vc4n_calico-system(e3a12862-3ba4-45d9-a86a-f2a0e492dbe1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8vc4n_calico-system(e3a12862-3ba4-45d9-a86a-f2a0e492dbe1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8vc4n" podUID="e3a12862-3ba4-45d9-a86a-f2a0e492dbe1" May 13 00:39:18.854563 env[1204]: time="2025-05-13T00:39:18.854497493Z" level=error msg="Failed to destroy network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.854877 env[1204]: time="2025-05-13T00:39:18.854841571Z" level=error msg="encountered an error cleaning up failed sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.854927 env[1204]: time="2025-05-13T00:39:18.854907776Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-75c768cf7-66sf4,Uid:ea02011d-117d-451e-84fb-5fdb7db708a7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.855120 kubelet[1946]: E0513 00:39:18.855071 1946 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:18.855120 kubelet[1946]: E0513 00:39:18.855106 1946 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-75c768cf7-66sf4" May 13 00:39:18.855120 kubelet[1946]: E0513 00:39:18.855119 1946 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-75c768cf7-66sf4" May 13 00:39:18.855230 kubelet[1946]: E0513 00:39:18.855158 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-75c768cf7-66sf4_calico-system(ea02011d-117d-451e-84fb-5fdb7db708a7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-75c768cf7-66sf4_calico-system(ea02011d-117d-451e-84fb-5fdb7db708a7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-75c768cf7-66sf4" podUID="ea02011d-117d-451e-84fb-5fdb7db708a7" May 13 00:39:19.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.18:22-10.0.0.1:52762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:19.107168 systemd[1]: Started sshd@7-10.0.0.18:22-10.0.0.1:52762.service. May 13 00:39:19.147000 audit[2907]: USER_ACCT pid=2907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:19.149107 sshd[2907]: Accepted publickey for core from 10.0.0.1 port 52762 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:19.149000 audit[2907]: CRED_ACQ pid=2907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:19.149000 audit[2907]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf6d17e40 a2=3 a3=0 items=0 ppid=1 pid=2907 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:19.149000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:19.150319 sshd[2907]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:19.154280 systemd-logind[1194]: New session 8 of user core. May 13 00:39:19.155350 systemd[1]: Started session-8.scope. May 13 00:39:19.159000 audit[2907]: USER_START pid=2907 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:19.160000 audit[2909]: CRED_ACQ pid=2909 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:19.273824 sshd[2907]: pam_unix(sshd:session): session closed for user core May 13 00:39:19.273000 audit[2907]: USER_END pid=2907 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:19.274000 audit[2907]: CRED_DISP pid=2907 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:19.276600 systemd[1]: sshd@7-10.0.0.18:22-10.0.0.1:52762.service: Deactivated successfully. May 13 00:39:19.277373 systemd[1]: session-8.scope: Deactivated successfully. May 13 00:39:19.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.18:22-10.0.0.1:52762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:19.278301 systemd-logind[1194]: Session 8 logged out. Waiting for processes to exit. May 13 00:39:19.279065 systemd-logind[1194]: Removed session 8. May 13 00:39:19.744658 kubelet[1946]: I0513 00:39:19.744622 1946 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:19.745347 env[1204]: time="2025-05-13T00:39:19.745297787Z" level=info msg="StopPodSandbox for \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\"" May 13 00:39:19.746146 kubelet[1946]: I0513 00:39:19.746118 1946 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:19.746726 env[1204]: time="2025-05-13T00:39:19.746697516Z" level=info msg="StopPodSandbox for \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\"" May 13 00:39:19.747194 kubelet[1946]: I0513 00:39:19.747173 1946 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:19.747635 env[1204]: time="2025-05-13T00:39:19.747608162Z" level=info msg="StopPodSandbox for \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\"" May 13 00:39:19.748810 kubelet[1946]: I0513 00:39:19.748775 1946 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:19.749211 env[1204]: time="2025-05-13T00:39:19.749163424Z" level=info msg="StopPodSandbox for \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\"" May 13 00:39:19.750614 kubelet[1946]: I0513 00:39:19.750576 1946 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:19.751040 env[1204]: time="2025-05-13T00:39:19.751003602Z" level=info msg="StopPodSandbox for \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\"" May 13 00:39:19.752151 kubelet[1946]: I0513 00:39:19.752126 1946 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:19.752661 env[1204]: time="2025-05-13T00:39:19.752615851Z" level=info msg="StopPodSandbox for \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\"" May 13 00:39:19.791558 env[1204]: time="2025-05-13T00:39:19.791485387Z" level=error msg="StopPodSandbox for \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\" failed" error="failed to destroy network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:19.791987 kubelet[1946]: E0513 00:39:19.791811 1946 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:19.791987 kubelet[1946]: E0513 00:39:19.791858 1946 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782"} May 13 00:39:19.791987 kubelet[1946]: E0513 00:39:19.791927 1946 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04b0ee45-cb91-41bd-b95a-6ad53709a896\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:39:19.791987 kubelet[1946]: E0513 00:39:19.791949 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04b0ee45-cb91-41bd-b95a-6ad53709a896\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xjvld" podUID="04b0ee45-cb91-41bd-b95a-6ad53709a896" May 13 00:39:19.817388 env[1204]: time="2025-05-13T00:39:19.817312078Z" level=error msg="StopPodSandbox for \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\" failed" error="failed to destroy network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:19.817851 kubelet[1946]: E0513 00:39:19.817814 1946 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:19.817851 kubelet[1946]: E0513 00:39:19.817849 1946 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc"} May 13 00:39:19.818025 kubelet[1946]: E0513 00:39:19.817877 1946 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a2a2bd3-12f7-4300-991c-bbe6ee3751df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:39:19.818025 kubelet[1946]: E0513 00:39:19.817919 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a2a2bd3-12f7-4300-991c-bbe6ee3751df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-nhnf5" podUID="0a2a2bd3-12f7-4300-991c-bbe6ee3751df" May 13 00:39:19.827285 env[1204]: time="2025-05-13T00:39:19.827236054Z" level=error msg="StopPodSandbox for \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\" failed" error="failed to destroy network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:19.827484 kubelet[1946]: E0513 00:39:19.827451 1946 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:19.827553 kubelet[1946]: E0513 00:39:19.827486 1946 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd"} May 13 00:39:19.827553 kubelet[1946]: E0513 00:39:19.827512 1946 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04d6ce06-a96b-4d68-aeab-4e281e1f4fcb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:39:19.827553 kubelet[1946]: E0513 00:39:19.827528 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04d6ce06-a96b-4d68-aeab-4e281e1f4fcb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-hpvlr" podUID="04d6ce06-a96b-4d68-aeab-4e281e1f4fcb" May 13 00:39:19.828442 env[1204]: time="2025-05-13T00:39:19.828408814Z" level=error msg="StopPodSandbox for \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\" failed" error="failed to destroy network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:19.828856 kubelet[1946]: E0513 00:39:19.828668 1946 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:19.828856 kubelet[1946]: E0513 00:39:19.828727 1946 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a"} May 13 00:39:19.828856 kubelet[1946]: E0513 00:39:19.828770 1946 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:39:19.828856 kubelet[1946]: E0513 00:39:19.828799 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8vc4n" podUID="e3a12862-3ba4-45d9-a86a-f2a0e492dbe1" May 13 00:39:19.834767 env[1204]: time="2025-05-13T00:39:19.834703770Z" level=error msg="StopPodSandbox for \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\" failed" error="failed to destroy network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:19.834950 kubelet[1946]: E0513 00:39:19.834887 1946 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:19.834950 kubelet[1946]: E0513 00:39:19.834933 1946 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232"} May 13 00:39:19.834950 kubelet[1946]: E0513 00:39:19.834952 1946 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9012a999-4581-4546-b67f-ab4db466229c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:39:19.835133 kubelet[1946]: E0513 00:39:19.834969 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9012a999-4581-4546-b67f-ab4db466229c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-b4z98" podUID="9012a999-4581-4546-b67f-ab4db466229c" May 13 00:39:19.836530 env[1204]: time="2025-05-13T00:39:19.836481300Z" level=error msg="StopPodSandbox for \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\" failed" error="failed to destroy network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:39:19.836769 kubelet[1946]: E0513 00:39:19.836715 1946 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:19.836845 kubelet[1946]: E0513 00:39:19.836777 1946 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7"} May 13 00:39:19.836845 kubelet[1946]: E0513 00:39:19.836812 1946 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ea02011d-117d-451e-84fb-5fdb7db708a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:39:19.836955 kubelet[1946]: E0513 00:39:19.836846 1946 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ea02011d-117d-451e-84fb-5fdb7db708a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-75c768cf7-66sf4" podUID="ea02011d-117d-451e-84fb-5fdb7db708a7" May 13 00:39:24.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.18:22-10.0.0.1:52770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:24.279086 systemd[1]: Started sshd@8-10.0.0.18:22-10.0.0.1:52770.service. May 13 00:39:24.284394 kernel: kauditd_printk_skb: 51 callbacks suppressed May 13 00:39:24.284542 kernel: audit: type=1130 audit(1747096764.278:1010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.18:22-10.0.0.1:52770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:24.322000 audit[3067]: USER_ACCT pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.328242 sshd[3067]: Accepted publickey for core from 10.0.0.1 port 52770 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:24.327000 audit[3067]: CRED_ACQ pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.329024 kernel: audit: type=1101 audit(1747096764.322:1011): pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.329068 kernel: audit: type=1103 audit(1747096764.327:1012): pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.329317 sshd[3067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:24.335473 kernel: audit: type=1006 audit(1747096764.327:1013): pid=3067 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 13 00:39:24.335658 kernel: audit: type=1300 audit(1747096764.327:1013): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe73084d0 a2=3 a3=0 items=0 ppid=1 pid=3067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:24.327000 audit[3067]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe73084d0 a2=3 a3=0 items=0 ppid=1 pid=3067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:24.327000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:24.341925 kernel: audit: type=1327 audit(1747096764.327:1013): proctitle=737368643A20636F7265205B707269765D May 13 00:39:24.342772 systemd-logind[1194]: New session 9 of user core. May 13 00:39:24.343978 systemd[1]: Started session-9.scope. May 13 00:39:24.347000 audit[3067]: USER_START pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.349000 audit[3069]: CRED_ACQ pid=3069 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.357402 kernel: audit: type=1105 audit(1747096764.347:1014): pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.357573 kernel: audit: type=1103 audit(1747096764.349:1015): pid=3069 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.470210 sshd[3067]: pam_unix(sshd:session): session closed for user core May 13 00:39:24.470000 audit[3067]: USER_END pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.470000 audit[3067]: CRED_DISP pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.481841 kernel: audit: type=1106 audit(1747096764.470:1016): pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.481912 kernel: audit: type=1104 audit(1747096764.470:1017): pid=3067 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:24.482331 systemd[1]: sshd@8-10.0.0.18:22-10.0.0.1:52770.service: Deactivated successfully. May 13 00:39:24.483366 systemd[1]: session-9.scope: Deactivated successfully. May 13 00:39:24.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.18:22-10.0.0.1:52770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:24.483984 systemd-logind[1194]: Session 9 logged out. Waiting for processes to exit. May 13 00:39:24.484671 systemd-logind[1194]: Removed session 9. May 13 00:39:27.192439 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1101604960.mount: Deactivated successfully. May 13 00:39:28.262006 env[1204]: time="2025-05-13T00:39:28.261886577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:28.265794 env[1204]: time="2025-05-13T00:39:28.265721732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:28.268204 env[1204]: time="2025-05-13T00:39:28.268140902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:28.272033 env[1204]: time="2025-05-13T00:39:28.271317758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:28.272525 env[1204]: time="2025-05-13T00:39:28.272469165Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 00:39:28.283480 env[1204]: time="2025-05-13T00:39:28.282264310Z" level=info msg="CreateContainer within sandbox \"6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:39:28.305497 env[1204]: time="2025-05-13T00:39:28.305422095Z" level=info msg="CreateContainer within sandbox \"6322d09bc2146a8af4feec72a2420d65d99de42215434e418c7cdc6ebb296799\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1105cc6a14b80613cf05325ef38e9193b88efc30269f728bb543f87181847100\"" May 13 00:39:28.306181 env[1204]: time="2025-05-13T00:39:28.306143943Z" level=info msg="StartContainer for \"1105cc6a14b80613cf05325ef38e9193b88efc30269f728bb543f87181847100\"" May 13 00:39:28.325867 systemd[1]: Started cri-containerd-1105cc6a14b80613cf05325ef38e9193b88efc30269f728bb543f87181847100.scope. May 13 00:39:28.347000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fa69631fcb8 items=0 ppid=2402 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:28.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303563633661313462383036313363663035333235656633386539 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.347000 audit: BPF prog-id=136 op=LOAD May 13 00:39:28.347000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000398108 items=0 ppid=2402 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:28.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303563633661313462383036313363663035333235656633386539 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit: BPF prog-id=137 op=LOAD May 13 00:39:28.348000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000398158 items=0 ppid=2402 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:28.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303563633661313462383036313363663035333235656633386539 May 13 00:39:28.348000 audit: BPF prog-id=137 op=UNLOAD May 13 00:39:28.348000 audit: BPF prog-id=136 op=UNLOAD May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:28.348000 audit: BPF prog-id=138 op=LOAD May 13 00:39:28.348000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003981e8 items=0 ppid=2402 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:28.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131303563633661313462383036313363663035333235656633386539 May 13 00:39:28.423190 env[1204]: time="2025-05-13T00:39:28.423100128Z" level=info msg="StartContainer for \"1105cc6a14b80613cf05325ef38e9193b88efc30269f728bb543f87181847100\" returns successfully" May 13 00:39:28.473017 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:39:28.473211 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:39:28.778011 kubelet[1946]: E0513 00:39:28.774861 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:29.481822 systemd[1]: Started sshd@9-10.0.0.18:22-10.0.0.1:40422.service. May 13 00:39:29.489969 kernel: kauditd_printk_skb: 44 callbacks suppressed May 13 00:39:29.490136 kernel: audit: type=1130 audit(1747096769.481:1025): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.18:22-10.0.0.1:40422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:29.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.18:22-10.0.0.1:40422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:29.562000 audit[3170]: USER_ACCT pid=3170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.564046 sshd[3170]: Accepted publickey for core from 10.0.0.1 port 40422 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:29.569000 audit[3170]: CRED_ACQ pid=3170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.571171 sshd[3170]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:29.576229 kernel: audit: type=1101 audit(1747096769.562:1026): pid=3170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.576401 kernel: audit: type=1103 audit(1747096769.569:1027): pid=3170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.577371 systemd-logind[1194]: New session 10 of user core. May 13 00:39:29.578075 systemd[1]: Started session-10.scope. May 13 00:39:29.583106 kernel: audit: type=1006 audit(1747096769.569:1028): pid=3170 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 00:39:29.583248 kernel: audit: type=1300 audit(1747096769.569:1028): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda60f6e30 a2=3 a3=0 items=0 ppid=1 pid=3170 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:29.569000 audit[3170]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda60f6e30 a2=3 a3=0 items=0 ppid=1 pid=3170 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:29.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:29.596095 kernel: audit: type=1327 audit(1747096769.569:1028): proctitle=737368643A20636F7265205B707269765D May 13 00:39:29.596246 kernel: audit: type=1105 audit(1747096769.592:1029): pid=3170 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.592000 audit[3170]: USER_START pid=3170 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.601642 kernel: audit: type=1103 audit(1747096769.594:1030): pid=3172 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.594000 audit[3172]: CRED_ACQ pid=3172 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.781099 kubelet[1946]: E0513 00:39:29.780272 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:29.808553 sshd[3170]: pam_unix(sshd:session): session closed for user core May 13 00:39:29.820558 systemd[1]: run-containerd-runc-k8s.io-1105cc6a14b80613cf05325ef38e9193b88efc30269f728bb543f87181847100-runc.jIdAu7.mount: Deactivated successfully. May 13 00:39:29.822000 audit[3170]: USER_END pid=3170 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.825488 systemd[1]: sshd@9-10.0.0.18:22-10.0.0.1:40422.service: Deactivated successfully. May 13 00:39:29.826375 systemd[1]: session-10.scope: Deactivated successfully. May 13 00:39:29.827178 systemd-logind[1194]: Session 10 logged out. Waiting for processes to exit. May 13 00:39:29.830554 systemd-logind[1194]: Removed session 10. May 13 00:39:29.830982 kernel: audit: type=1106 audit(1747096769.822:1031): pid=3170 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.822000 audit[3170]: CRED_DISP pid=3170 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:29.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.18:22-10.0.0.1:40422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:29.837114 kernel: audit: type=1104 audit(1747096769.822:1032): pid=3170 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:30.002000 audit[3278]: AVC avc: denied { write } for pid=3278 comm="tee" name="fd" dev="proc" ino=23291 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:30.002000 audit[3278]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcd8e8a2a a2=241 a3=1b6 items=1 ppid=3225 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.002000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:39:30.002000 audit: PATH item=0 name="/dev/fd/63" inode=24881 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:30.002000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:30.028000 audit[3247]: AVC avc: denied { write } for pid=3247 comm="tee" name="fd" dev="proc" ino=24884 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:30.028000 audit[3247]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff574bea2a a2=241 a3=1b6 items=1 ppid=3223 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.028000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:39:30.028000 audit: PATH item=0 name="/dev/fd/63" inode=25952 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:30.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:30.044000 audit[3275]: AVC avc: denied { write } for pid=3275 comm="tee" name="fd" dev="proc" ino=24080 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:30.044000 audit[3275]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4ecfba2b a2=241 a3=1b6 items=1 ppid=3218 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.044000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:39:30.044000 audit: PATH item=0 name="/dev/fd/63" inode=23286 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:30.044000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:30.045000 audit[3291]: AVC avc: denied { write } for pid=3291 comm="tee" name="fd" dev="proc" ino=24084 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:30.045000 audit[3291]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff640fda2c a2=241 a3=1b6 items=1 ppid=3226 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.045000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:39:30.045000 audit: PATH item=0 name="/dev/fd/63" inode=23296 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:30.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:30.047000 audit[3294]: AVC avc: denied { write } for pid=3294 comm="tee" name="fd" dev="proc" ino=25969 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:30.047000 audit[3294]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1942da1b a2=241 a3=1b6 items=1 ppid=3219 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.047000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:39:30.047000 audit: PATH item=0 name="/dev/fd/63" inode=23297 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:30.047000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:30.062000 audit[3298]: AVC avc: denied { write } for pid=3298 comm="tee" name="fd" dev="proc" ino=24093 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:30.062000 audit[3302]: AVC avc: denied { write } for pid=3302 comm="tee" name="fd" dev="proc" ino=25973 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:39:30.062000 audit[3298]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3ea95a2a a2=241 a3=1b6 items=1 ppid=3229 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.062000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:39:30.062000 audit: PATH item=0 name="/dev/fd/63" inode=24088 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:30.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:30.062000 audit[3302]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5d49da1a a2=241 a3=1b6 items=1 ppid=3222 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.062000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:39:30.062000 audit: PATH item=0 name="/dev/fd/63" inode=24888 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:39:30.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.153000 audit: BPF prog-id=139 op=LOAD May 13 00:39:30.153000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee583cb90 a2=98 a3=3 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.153000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.153000 audit: BPF prog-id=139 op=UNLOAD May 13 00:39:30.154000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit: BPF prog-id=140 op=LOAD May 13 00:39:30.154000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee583c970 a2=74 a3=540051 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.154000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.154000 audit: BPF prog-id=140 op=UNLOAD May 13 00:39:30.154000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.154000 audit: BPF prog-id=141 op=LOAD May 13 00:39:30.154000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee583c9a0 a2=94 a3=2 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.154000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.154000 audit: BPF prog-id=141 op=UNLOAD May 13 00:39:30.261000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit: BPF prog-id=142 op=LOAD May 13 00:39:30.261000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee583c860 a2=40 a3=1 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.261000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.261000 audit: BPF prog-id=142 op=UNLOAD May 13 00:39:30.261000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.261000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffee583c930 a2=50 a3=7ffee583ca10 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.261000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee583c870 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee583c8a0 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee583c7b0 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee583c8c0 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee583c8a0 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee583c890 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee583c8c0 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee583c8a0 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee583c8c0 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee583c890 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee583c900 a2=28 a3=0 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee583c6b0 a2=50 a3=1 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.268000 audit: BPF prog-id=143 op=LOAD May 13 00:39:30.268000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee583c6b0 a2=94 a3=5 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.268000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.269000 audit: BPF prog-id=143 op=UNLOAD May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee583c760 a2=50 a3=1 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffee583c880 a2=4 a3=38 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { confidentiality } for pid=3338 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:30.269000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee583c8d0 a2=94 a3=6 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { confidentiality } for pid=3338 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:30.269000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee583c080 a2=94 a3=83 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.269000 audit[3338]: AVC avc: denied { confidentiality } for pid=3338 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:30.269000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee583c080 a2=94 a3=83 items=0 ppid=3224 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit: BPF prog-id=144 op=LOAD May 13 00:39:30.276000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb03889f0 a2=98 a3=1999999999999999 items=0 ppid=3224 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.276000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:39:30.276000 audit: BPF prog-id=144 op=UNLOAD May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit: BPF prog-id=145 op=LOAD May 13 00:39:30.276000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb03888d0 a2=74 a3=ffff items=0 ppid=3224 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.276000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:39:30.276000 audit: BPF prog-id=145 op=UNLOAD May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.276000 audit: BPF prog-id=146 op=LOAD May 13 00:39:30.276000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb0388910 a2=40 a3=7ffcb0388af0 items=0 ppid=3224 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.276000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:39:30.277000 audit: BPF prog-id=146 op=UNLOAD May 13 00:39:30.318020 systemd-networkd[1032]: vxlan.calico: Link UP May 13 00:39:30.318033 systemd-networkd[1032]: vxlan.calico: Gained carrier May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit: BPF prog-id=147 op=LOAD May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb28f0100 a2=98 a3=ffffffff items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit: BPF prog-id=147 op=UNLOAD May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit: BPF prog-id=148 op=LOAD May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb28eff10 a2=74 a3=540051 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit: BPF prog-id=148 op=UNLOAD May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit: BPF prog-id=149 op=LOAD May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb28eff40 a2=94 a3=2 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit: BPF prog-id=149 op=UNLOAD May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb28efe10 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb28efe40 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb28efd50 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb28efe60 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb28efe40 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb28efe30 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb28efe60 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb28efe40 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb28efe60 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb28efe30 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb28efea0 a2=28 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.335000 audit: BPF prog-id=150 op=LOAD May 13 00:39:30.335000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb28efd10 a2=40 a3=0 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.335000 audit: BPF prog-id=150 op=UNLOAD May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdb28efd00 a2=50 a3=2800 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdb28efd00 a2=50 a3=2800 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit: BPF prog-id=151 op=LOAD May 13 00:39:30.336000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb28ef520 a2=94 a3=2 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.336000 audit: BPF prog-id=151 op=UNLOAD May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { perfmon } for pid=3366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit[3366]: AVC avc: denied { bpf } for pid=3366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.336000 audit: BPF prog-id=152 op=LOAD May 13 00:39:30.336000 audit[3366]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb28ef620 a2=94 a3=30 items=0 ppid=3224 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.340000 audit: BPF prog-id=153 op=LOAD May 13 00:39:30.340000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca0ca7d10 a2=98 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.340000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.340000 audit: BPF prog-id=153 op=UNLOAD May 13 00:39:30.341000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit: BPF prog-id=154 op=LOAD May 13 00:39:30.341000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca0ca7af0 a2=74 a3=540051 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.341000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.341000 audit: BPF prog-id=154 op=UNLOAD May 13 00:39:30.341000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.341000 audit: BPF prog-id=155 op=LOAD May 13 00:39:30.341000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca0ca7b20 a2=94 a3=2 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.341000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.341000 audit: BPF prog-id=155 op=UNLOAD May 13 00:39:30.450000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.450000 audit: BPF prog-id=156 op=LOAD May 13 00:39:30.450000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca0ca79e0 a2=40 a3=1 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.451000 audit: BPF prog-id=156 op=UNLOAD May 13 00:39:30.451000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.451000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca0ca7ab0 a2=50 a3=7ffca0ca7b90 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.451000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca0ca79f0 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca0ca7a20 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca0ca7930 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca0ca7a40 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca0ca7a20 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca0ca7a10 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca0ca7a40 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca0ca7a20 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca0ca7a40 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca0ca7a10 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca0ca7a80 a2=28 a3=0 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca0ca7830 a2=50 a3=1 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit: BPF prog-id=157 op=LOAD May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca0ca7830 a2=94 a3=5 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit: BPF prog-id=157 op=UNLOAD May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca0ca78e0 a2=50 a3=1 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffca0ca7a00 a2=4 a3=38 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.458000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:30.458000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca0ca7a50 a2=94 a3=6 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:30.459000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca0ca7200 a2=94 a3=83 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:39:30.459000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca0ca7200 a2=94 a3=83 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca0ca8c40 a2=10 a3=208 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca0ca8ae0 a2=10 a3=3 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca0ca8a80 a2=10 a3=3 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.459000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:30.459000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca0ca8a80 a2=10 a3=7 items=0 ppid=3224 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:39:30.468000 audit: BPF prog-id=152 op=UNLOAD May 13 00:39:30.508000 audit[3400]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3400 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:30.508000 audit[3400]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffeacaef960 a2=0 a3=7ffeacaef94c items=0 ppid=3224 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.508000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:30.516000 audit[3403]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3403 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:30.516000 audit[3403]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe3b91d900 a2=0 a3=7ffe3b91d8ec items=0 ppid=3224 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.516000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:30.520000 audit[3402]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:30.520000 audit[3401]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3401 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:30.520000 audit[3401]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff456c52b0 a2=0 a3=7fff456c529c items=0 ppid=3224 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.520000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:30.520000 audit[3402]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffe0253000 a2=0 a3=7fffe0252fec items=0 ppid=3224 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:30.520000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:30.782588 kubelet[1946]: E0513 00:39:30.782504 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:32.010229 systemd-networkd[1032]: vxlan.calico: Gained IPv6LL May 13 00:39:32.486091 env[1204]: time="2025-05-13T00:39:32.485960577Z" level=info msg="StopPodSandbox for \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\"" May 13 00:39:32.486091 env[1204]: time="2025-05-13T00:39:32.486016983Z" level=info msg="StopPodSandbox for \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\"" May 13 00:39:32.486486 env[1204]: time="2025-05-13T00:39:32.485980815Z" level=info msg="StopPodSandbox for \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\"" May 13 00:39:32.581891 kubelet[1946]: I0513 00:39:32.581807 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-9trjf" podStartSLOduration=5.077758741 podStartE2EDuration="26.581780908s" podCreationTimestamp="2025-05-13 00:39:06 +0000 UTC" firstStartedPulling="2025-05-13 00:39:06.769812296 +0000 UTC m=+12.396805534" lastFinishedPulling="2025-05-13 00:39:28.273834453 +0000 UTC m=+33.900827701" observedRunningTime="2025-05-13 00:39:28.847694804 +0000 UTC m=+34.474688072" watchObservedRunningTime="2025-05-13 00:39:32.581780908 +0000 UTC m=+38.208774156" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.600 [INFO][3484] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.601 [INFO][3484] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" iface="eth0" netns="/var/run/netns/cni-7237f7f3-4216-d9eb-6d79-e0b4a1bc2b0e" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.601 [INFO][3484] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" iface="eth0" netns="/var/run/netns/cni-7237f7f3-4216-d9eb-6d79-e0b4a1bc2b0e" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.601 [INFO][3484] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" iface="eth0" netns="/var/run/netns/cni-7237f7f3-4216-d9eb-6d79-e0b4a1bc2b0e" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.601 [INFO][3484] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.601 [INFO][3484] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.637 [INFO][3517] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.637 [INFO][3517] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.637 [INFO][3517] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.660 [WARNING][3517] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.660 [INFO][3517] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.662 [INFO][3517] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:32.665463 env[1204]: 2025-05-13 00:39:32.664 [INFO][3484] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:32.666484 env[1204]: time="2025-05-13T00:39:32.666443892Z" level=info msg="TearDown network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\" successfully" May 13 00:39:32.666533 env[1204]: time="2025-05-13T00:39:32.666485671Z" level=info msg="StopPodSandbox for \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\" returns successfully" May 13 00:39:32.667386 kubelet[1946]: E0513 00:39:32.666881 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:32.667731 env[1204]: time="2025-05-13T00:39:32.667706016Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xjvld,Uid:04b0ee45-cb91-41bd-b95a-6ad53709a896,Namespace:kube-system,Attempt:1,}" May 13 00:39:32.668401 systemd[1]: run-netns-cni\x2d7237f7f3\x2d4216\x2dd9eb\x2d6d79\x2de0b4a1bc2b0e.mount: Deactivated successfully. May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.598 [INFO][3489] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.599 [INFO][3489] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" iface="eth0" netns="/var/run/netns/cni-0ca927f5-e4d0-fead-53ab-3024e64ca38d" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.599 [INFO][3489] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" iface="eth0" netns="/var/run/netns/cni-0ca927f5-e4d0-fead-53ab-3024e64ca38d" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.599 [INFO][3489] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" iface="eth0" netns="/var/run/netns/cni-0ca927f5-e4d0-fead-53ab-3024e64ca38d" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.599 [INFO][3489] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.599 [INFO][3489] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.646 [INFO][3518] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.646 [INFO][3518] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.662 [INFO][3518] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.669 [WARNING][3518] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.669 [INFO][3518] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.670 [INFO][3518] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:32.673990 env[1204]: 2025-05-13 00:39:32.672 [INFO][3489] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:32.676096 systemd[1]: run-netns-cni\x2d0ca927f5\x2de4d0\x2dfead\x2d53ab\x2d3024e64ca38d.mount: Deactivated successfully. May 13 00:39:32.676826 env[1204]: time="2025-05-13T00:39:32.676763084Z" level=info msg="TearDown network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\" successfully" May 13 00:39:32.676826 env[1204]: time="2025-05-13T00:39:32.676809471Z" level=info msg="StopPodSandbox for \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\" returns successfully" May 13 00:39:32.677737 env[1204]: time="2025-05-13T00:39:32.677708502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bdf86dbbc-b4z98,Uid:9012a999-4581-4546-b67f-ab4db466229c,Namespace:calico-apiserver,Attempt:1,}" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.581 [INFO][3499] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.581 [INFO][3499] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" iface="eth0" netns="/var/run/netns/cni-552f84b8-cfce-4fc4-d377-191893578812" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.581 [INFO][3499] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" iface="eth0" netns="/var/run/netns/cni-552f84b8-cfce-4fc4-d377-191893578812" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.582 [INFO][3499] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" iface="eth0" netns="/var/run/netns/cni-552f84b8-cfce-4fc4-d377-191893578812" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.582 [INFO][3499] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.582 [INFO][3499] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.648 [INFO][3510] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.648 [INFO][3510] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.670 [INFO][3510] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.677 [WARNING][3510] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.677 [INFO][3510] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.678 [INFO][3510] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:32.682174 env[1204]: 2025-05-13 00:39:32.680 [INFO][3499] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:32.682503 env[1204]: time="2025-05-13T00:39:32.682319631Z" level=info msg="TearDown network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\" successfully" May 13 00:39:32.682503 env[1204]: time="2025-05-13T00:39:32.682340721Z" level=info msg="StopPodSandbox for \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\" returns successfully" May 13 00:39:32.682808 env[1204]: time="2025-05-13T00:39:32.682775908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bdf86dbbc-nhnf5,Uid:0a2a2bd3-12f7-4300-991c-bbe6ee3751df,Namespace:calico-apiserver,Attempt:1,}" May 13 00:39:32.684257 systemd[1]: run-netns-cni\x2d552f84b8\x2dcfce\x2d4fc4\x2dd377\x2d191893578812.mount: Deactivated successfully. May 13 00:39:33.239850 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:39:33.240007 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali82b7aa16480: link becomes ready May 13 00:39:33.240272 systemd-networkd[1032]: cali82b7aa16480: Link UP May 13 00:39:33.240405 systemd-networkd[1032]: cali82b7aa16480: Gained carrier May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.087 [INFO][3551] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0 calico-apiserver-6bdf86dbbc- calico-apiserver 0a2a2bd3-12f7-4300-991c-bbe6ee3751df 889 0 2025-05-13 00:39:06 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bdf86dbbc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6bdf86dbbc-nhnf5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali82b7aa16480 [] []}} ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-nhnf5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.088 [INFO][3551] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-nhnf5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.128 [INFO][3576] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" HandleID="k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.206 [INFO][3576] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" HandleID="k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004353a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6bdf86dbbc-nhnf5", "timestamp":"2025-05-13 00:39:33.12841348 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.206 [INFO][3576] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.206 [INFO][3576] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.206 [INFO][3576] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.208 [INFO][3576] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.214 [INFO][3576] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.218 [INFO][3576] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.220 [INFO][3576] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.222 [INFO][3576] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.223 [INFO][3576] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.224 [INFO][3576] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.229 [INFO][3576] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.233 [INFO][3576] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.233 [INFO][3576] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" host="localhost" May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.233 [INFO][3576] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:33.250923 env[1204]: 2025-05-13 00:39:33.233 [INFO][3576] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" HandleID="k8s-pod-network.64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:33.252013 env[1204]: 2025-05-13 00:39:33.236 [INFO][3551] cni-plugin/k8s.go 386: Populated endpoint ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-nhnf5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0", GenerateName:"calico-apiserver-6bdf86dbbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"0a2a2bd3-12f7-4300-991c-bbe6ee3751df", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bdf86dbbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6bdf86dbbc-nhnf5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82b7aa16480", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:33.252013 env[1204]: 2025-05-13 00:39:33.236 [INFO][3551] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-nhnf5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:33.252013 env[1204]: 2025-05-13 00:39:33.236 [INFO][3551] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali82b7aa16480 ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-nhnf5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:33.252013 env[1204]: 2025-05-13 00:39:33.239 [INFO][3551] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-nhnf5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:33.252013 env[1204]: 2025-05-13 00:39:33.240 [INFO][3551] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-nhnf5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0", GenerateName:"calico-apiserver-6bdf86dbbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"0a2a2bd3-12f7-4300-991c-bbe6ee3751df", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bdf86dbbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b", Pod:"calico-apiserver-6bdf86dbbc-nhnf5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82b7aa16480", MAC:"3a:bd:a9:20:bc:7f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:33.252013 env[1204]: 2025-05-13 00:39:33.246 [INFO][3551] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-nhnf5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:33.256000 audit[3614]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3614 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:33.256000 audit[3614]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffc40a043a0 a2=0 a3=7ffc40a0438c items=0 ppid=3224 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.256000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:33.294487 env[1204]: time="2025-05-13T00:39:33.294407146Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:33.294487 env[1204]: time="2025-05-13T00:39:33.294468471Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:33.294487 env[1204]: time="2025-05-13T00:39:33.294484231Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:33.294772 env[1204]: time="2025-05-13T00:39:33.294693174Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b pid=3622 runtime=io.containerd.runc.v2 May 13 00:39:33.305383 systemd[1]: Started cri-containerd-64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b.scope. May 13 00:39:33.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.314000 audit: BPF prog-id=158 op=LOAD May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3622 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613832626133653333653737636166373234626564383666656632 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3622 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613832626133653333653737636166373234626564383666656632 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit: BPF prog-id=159 op=LOAD May 13 00:39:33.315000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a1a60 items=0 ppid=3622 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613832626133653333653737636166373234626564383666656632 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit: BPF prog-id=160 op=LOAD May 13 00:39:33.315000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a1aa8 items=0 ppid=3622 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613832626133653333653737636166373234626564383666656632 May 13 00:39:33.315000 audit: BPF prog-id=160 op=UNLOAD May 13 00:39:33.315000 audit: BPF prog-id=159 op=UNLOAD May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.315000 audit: BPF prog-id=161 op=LOAD May 13 00:39:33.315000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a1eb8 items=0 ppid=3622 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613832626133653333653737636166373234626564383666656632 May 13 00:39:33.318161 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:39:33.341451 env[1204]: time="2025-05-13T00:39:33.341411678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bdf86dbbc-nhnf5,Uid:0a2a2bd3-12f7-4300-991c-bbe6ee3751df,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b\"" May 13 00:39:33.343152 env[1204]: time="2025-05-13T00:39:33.342637853Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:39:33.395496 systemd-networkd[1032]: cali529ea2a0f58: Link UP May 13 00:39:33.397345 systemd-networkd[1032]: cali529ea2a0f58: Gained carrier May 13 00:39:33.397923 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali529ea2a0f58: link becomes ready May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.094 [INFO][3545] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--xjvld-eth0 coredns-6f6b679f8f- kube-system 04b0ee45-cb91-41bd-b95a-6ad53709a896 891 0 2025-05-13 00:38:59 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-xjvld eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali529ea2a0f58 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Namespace="kube-system" Pod="coredns-6f6b679f8f-xjvld" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xjvld-" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.094 [INFO][3545] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Namespace="kube-system" Pod="coredns-6f6b679f8f-xjvld" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.143 [INFO][3589] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" HandleID="k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.207 [INFO][3589] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" HandleID="k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd100), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-xjvld", "timestamp":"2025-05-13 00:39:33.143138642 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.207 [INFO][3589] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.233 [INFO][3589] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.233 [INFO][3589] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.346 [INFO][3589] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.357 [INFO][3589] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.377 [INFO][3589] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.379 [INFO][3589] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.380 [INFO][3589] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.381 [INFO][3589] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.382 [INFO][3589] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698 May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.386 [INFO][3589] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.391 [INFO][3589] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.391 [INFO][3589] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" host="localhost" May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.391 [INFO][3589] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:33.407734 env[1204]: 2025-05-13 00:39:33.391 [INFO][3589] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" HandleID="k8s-pod-network.ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:33.408377 env[1204]: 2025-05-13 00:39:33.393 [INFO][3545] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Namespace="kube-system" Pod="coredns-6f6b679f8f-xjvld" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xjvld-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"04b0ee45-cb91-41bd-b95a-6ad53709a896", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-xjvld", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali529ea2a0f58", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:33.408377 env[1204]: 2025-05-13 00:39:33.394 [INFO][3545] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Namespace="kube-system" Pod="coredns-6f6b679f8f-xjvld" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:33.408377 env[1204]: 2025-05-13 00:39:33.394 [INFO][3545] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali529ea2a0f58 ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Namespace="kube-system" Pod="coredns-6f6b679f8f-xjvld" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:33.408377 env[1204]: 2025-05-13 00:39:33.397 [INFO][3545] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Namespace="kube-system" Pod="coredns-6f6b679f8f-xjvld" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:33.408377 env[1204]: 2025-05-13 00:39:33.397 [INFO][3545] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Namespace="kube-system" Pod="coredns-6f6b679f8f-xjvld" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xjvld-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"04b0ee45-cb91-41bd-b95a-6ad53709a896", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698", Pod:"coredns-6f6b679f8f-xjvld", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali529ea2a0f58", MAC:"c2:a3:27:33:ce:08", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:33.408377 env[1204]: 2025-05-13 00:39:33.405 [INFO][3545] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698" Namespace="kube-system" Pod="coredns-6f6b679f8f-xjvld" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:33.414000 audit[3670]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3670 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:33.414000 audit[3670]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffef51827b0 a2=0 a3=7ffef518279c items=0 ppid=3224 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.414000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:33.418798 env[1204]: time="2025-05-13T00:39:33.418732501Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:33.418798 env[1204]: time="2025-05-13T00:39:33.418770893Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:33.418798 env[1204]: time="2025-05-13T00:39:33.418780601Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:33.418977 env[1204]: time="2025-05-13T00:39:33.418946764Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698 pid=3679 runtime=io.containerd.runc.v2 May 13 00:39:33.428738 systemd[1]: Started cri-containerd-ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698.scope. May 13 00:39:33.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.437000 audit: BPF prog-id=162 op=LOAD May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3679 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363661373064613135343935663866326239623538636631326539 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3679 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363661373064613135343935663866326239623538636631326539 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit: BPF prog-id=163 op=LOAD May 13 00:39:33.438000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000399440 items=0 ppid=3679 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363661373064613135343935663866326239623538636631326539 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit: BPF prog-id=164 op=LOAD May 13 00:39:33.438000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000399488 items=0 ppid=3679 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363661373064613135343935663866326239623538636631326539 May 13 00:39:33.438000 audit: BPF prog-id=164 op=UNLOAD May 13 00:39:33.438000 audit: BPF prog-id=163 op=UNLOAD May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.438000 audit: BPF prog-id=165 op=LOAD May 13 00:39:33.438000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000399898 items=0 ppid=3679 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363661373064613135343935663866326239623538636631326539 May 13 00:39:33.440099 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:39:33.462555 env[1204]: time="2025-05-13T00:39:33.462515658Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xjvld,Uid:04b0ee45-cb91-41bd-b95a-6ad53709a896,Namespace:kube-system,Attempt:1,} returns sandbox id \"ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698\"" May 13 00:39:33.463893 kubelet[1946]: E0513 00:39:33.463441 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:33.465122 env[1204]: time="2025-05-13T00:39:33.465096418Z" level=info msg="CreateContainer within sandbox \"ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:39:33.481879 env[1204]: time="2025-05-13T00:39:33.481704710Z" level=info msg="CreateContainer within sandbox \"ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7402cc6e86773bc3d56fb6bc77e22f45002dcc9feaf7398e16b84787db14d833\"" May 13 00:39:33.482329 env[1204]: time="2025-05-13T00:39:33.482296553Z" level=info msg="StartContainer for \"7402cc6e86773bc3d56fb6bc77e22f45002dcc9feaf7398e16b84787db14d833\"" May 13 00:39:33.486712 env[1204]: time="2025-05-13T00:39:33.486633195Z" level=info msg="StopPodSandbox for \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\"" May 13 00:39:33.498869 systemd[1]: Started cri-containerd-7402cc6e86773bc3d56fb6bc77e22f45002dcc9feaf7398e16b84787db14d833.scope. May 13 00:39:33.509499 systemd-networkd[1032]: cali0412f0e01c8: Link UP May 13 00:39:33.512677 systemd-networkd[1032]: cali0412f0e01c8: Gained carrier May 13 00:39:33.512945 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0412f0e01c8: link becomes ready May 13 00:39:33.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit: BPF prog-id=166 op=LOAD May 13 00:39:33.515000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3679 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303263633665383637373362633364353666623662633737653232 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3679 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303263633665383637373362633364353666623662633737653232 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.515000 audit: BPF prog-id=167 op=LOAD May 13 00:39:33.515000 audit[3724]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a6470 items=0 ppid=3679 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303263633665383637373362633364353666623662633737653232 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit: BPF prog-id=168 op=LOAD May 13 00:39:33.516000 audit[3724]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a64b8 items=0 ppid=3679 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303263633665383637373362633364353666623662633737653232 May 13 00:39:33.516000 audit: BPF prog-id=168 op=UNLOAD May 13 00:39:33.516000 audit: BPF prog-id=167 op=UNLOAD May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.516000 audit: BPF prog-id=169 op=LOAD May 13 00:39:33.516000 audit[3724]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a68c8 items=0 ppid=3679 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303263633665383637373362633364353666623662633737653232 May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.099 [INFO][3533] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0 calico-apiserver-6bdf86dbbc- calico-apiserver 9012a999-4581-4546-b67f-ab4db466229c 890 0 2025-05-13 00:39:06 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bdf86dbbc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6bdf86dbbc-b4z98 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0412f0e01c8 [] []}} ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-b4z98" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.099 [INFO][3533] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-b4z98" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.143 [INFO][3583] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" HandleID="k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.209 [INFO][3583] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" HandleID="k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000366a70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6bdf86dbbc-b4z98", "timestamp":"2025-05-13 00:39:33.143405604 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.209 [INFO][3583] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.391 [INFO][3583] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.391 [INFO][3583] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.411 [INFO][3583] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.459 [INFO][3583] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.478 [INFO][3583] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.481 [INFO][3583] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.483 [INFO][3583] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.483 [INFO][3583] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.484 [INFO][3583] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81 May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.489 [INFO][3583] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.494 [INFO][3583] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.494 [INFO][3583] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" host="localhost" May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.494 [INFO][3583] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:33.524287 env[1204]: 2025-05-13 00:39:33.494 [INFO][3583] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" HandleID="k8s-pod-network.0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:33.524869 env[1204]: 2025-05-13 00:39:33.497 [INFO][3533] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-b4z98" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0", GenerateName:"calico-apiserver-6bdf86dbbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"9012a999-4581-4546-b67f-ab4db466229c", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bdf86dbbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6bdf86dbbc-b4z98", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0412f0e01c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:33.524869 env[1204]: 2025-05-13 00:39:33.497 [INFO][3533] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-b4z98" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:33.524869 env[1204]: 2025-05-13 00:39:33.497 [INFO][3533] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0412f0e01c8 ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-b4z98" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:33.524869 env[1204]: 2025-05-13 00:39:33.513 [INFO][3533] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-b4z98" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:33.524869 env[1204]: 2025-05-13 00:39:33.513 [INFO][3533] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-b4z98" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0", GenerateName:"calico-apiserver-6bdf86dbbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"9012a999-4581-4546-b67f-ab4db466229c", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bdf86dbbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81", Pod:"calico-apiserver-6bdf86dbbc-b4z98", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0412f0e01c8", MAC:"be:a7:68:94:91:7f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:33.524869 env[1204]: 2025-05-13 00:39:33.522 [INFO][3533] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81" Namespace="calico-apiserver" Pod="calico-apiserver-6bdf86dbbc-b4z98" WorkloadEndpoint="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:33.532000 audit[3769]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3769 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:33.532000 audit[3769]: SYSCALL arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7ffd46ede540 a2=0 a3=7ffd46ede52c items=0 ppid=3224 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.532000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:33.544694 env[1204]: time="2025-05-13T00:39:33.544625693Z" level=info msg="StartContainer for \"7402cc6e86773bc3d56fb6bc77e22f45002dcc9feaf7398e16b84787db14d833\" returns successfully" May 13 00:39:33.549142 env[1204]: time="2025-05-13T00:39:33.548921198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:33.549142 env[1204]: time="2025-05-13T00:39:33.548968146Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:33.549142 env[1204]: time="2025-05-13T00:39:33.548980519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:33.549511 env[1204]: time="2025-05-13T00:39:33.549452337Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81 pid=3791 runtime=io.containerd.runc.v2 May 13 00:39:33.564277 systemd[1]: Started cri-containerd-0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81.scope. May 13 00:39:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit: BPF prog-id=170 op=LOAD May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343232373664353264363531323738333766633830326663313533 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343232373664353264363531323738333766633830326663313533 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit: BPF prog-id=171 op=LOAD May 13 00:39:33.581000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003fcf00 items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343232373664353264363531323738333766633830326663313533 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.581000 audit: BPF prog-id=172 op=LOAD May 13 00:39:33.581000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003fcf48 items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343232373664353264363531323738333766633830326663313533 May 13 00:39:33.582000 audit: BPF prog-id=172 op=UNLOAD May 13 00:39:33.582000 audit: BPF prog-id=171 op=UNLOAD May 13 00:39:33.582000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.582000 audit: BPF prog-id=173 op=LOAD May 13 00:39:33.582000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003fd358 items=0 ppid=3791 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343232373664353264363531323738333766633830326663313533 May 13 00:39:33.584588 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:39:33.617159 env[1204]: time="2025-05-13T00:39:33.617117298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bdf86dbbc-b4z98,Uid:9012a999-4581-4546-b67f-ab4db466229c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81\"" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.596 [INFO][3755] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.596 [INFO][3755] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" iface="eth0" netns="/var/run/netns/cni-b61c6151-f92c-f42f-2320-143295cde771" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.596 [INFO][3755] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" iface="eth0" netns="/var/run/netns/cni-b61c6151-f92c-f42f-2320-143295cde771" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.597 [INFO][3755] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" iface="eth0" netns="/var/run/netns/cni-b61c6151-f92c-f42f-2320-143295cde771" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.597 [INFO][3755] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.597 [INFO][3755] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.625 [INFO][3828] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.625 [INFO][3828] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.625 [INFO][3828] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.639 [WARNING][3828] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.639 [INFO][3828] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.640 [INFO][3828] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:33.645082 env[1204]: 2025-05-13 00:39:33.643 [INFO][3755] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:33.645649 env[1204]: time="2025-05-13T00:39:33.645619538Z" level=info msg="TearDown network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\" successfully" May 13 00:39:33.645729 env[1204]: time="2025-05-13T00:39:33.645708655Z" level=info msg="StopPodSandbox for \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\" returns successfully" May 13 00:39:33.646330 env[1204]: time="2025-05-13T00:39:33.646311037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8vc4n,Uid:e3a12862-3ba4-45d9-a86a-f2a0e492dbe1,Namespace:calico-system,Attempt:1,}" May 13 00:39:33.672803 systemd[1]: run-netns-cni\x2db61c6151\x2df92c\x2df42f\x2d2320\x2d143295cde771.mount: Deactivated successfully. May 13 00:39:33.792147 kubelet[1946]: E0513 00:39:33.791972 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:33.804665 kubelet[1946]: I0513 00:39:33.804019 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-xjvld" podStartSLOduration=34.803999582 podStartE2EDuration="34.803999582s" podCreationTimestamp="2025-05-13 00:38:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:39:33.801762296 +0000 UTC m=+39.428755534" watchObservedRunningTime="2025-05-13 00:39:33.803999582 +0000 UTC m=+39.430992860" May 13 00:39:33.815000 audit[3869]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:33.815000 audit[3869]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd21ab70c0 a2=0 a3=7ffd21ab70ac items=0 ppid=2074 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:33.822000 audit[3869]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:33.822000 audit[3869]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd21ab70c0 a2=0 a3=0 items=0 ppid=2074 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:33.876602 systemd-networkd[1032]: cali4fefa93df35: Link UP May 13 00:39:33.878159 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4fefa93df35: link becomes ready May 13 00:39:33.877943 systemd-networkd[1032]: cali4fefa93df35: Gained carrier May 13 00:39:33.882000 audit[3874]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=3874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:33.882000 audit[3874]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd52ed6380 a2=0 a3=7ffd52ed636c items=0 ppid=2074 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.882000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:33.892000 audit[3874]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:33.892000 audit[3874]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd52ed6380 a2=0 a3=7ffd52ed636c items=0 ppid=2074 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.695 [INFO][3846] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--8vc4n-eth0 csi-node-driver- calico-system e3a12862-3ba4-45d9-a86a-f2a0e492dbe1 915 0 2025-05-13 00:39:06 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-8vc4n eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali4fefa93df35 [] []}} ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Namespace="calico-system" Pod="csi-node-driver-8vc4n" WorkloadEndpoint="localhost-k8s-csi--node--driver--8vc4n-" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.696 [INFO][3846] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Namespace="calico-system" Pod="csi-node-driver-8vc4n" WorkloadEndpoint="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.723 [INFO][3860] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" HandleID="k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.839 [INFO][3860] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" HandleID="k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e77b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-8vc4n", "timestamp":"2025-05-13 00:39:33.723023748 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.839 [INFO][3860] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.839 [INFO][3860] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.839 [INFO][3860] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.841 [INFO][3860] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.845 [INFO][3860] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.850 [INFO][3860] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.852 [INFO][3860] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.854 [INFO][3860] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.854 [INFO][3860] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.856 [INFO][3860] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4 May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.862 [INFO][3860] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.872 [INFO][3860] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.872 [INFO][3860] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" host="localhost" May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.872 [INFO][3860] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:33.896913 env[1204]: 2025-05-13 00:39:33.872 [INFO][3860] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" HandleID="k8s-pod-network.8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.897434 env[1204]: 2025-05-13 00:39:33.874 [INFO][3846] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Namespace="calico-system" Pod="csi-node-driver-8vc4n" WorkloadEndpoint="localhost-k8s-csi--node--driver--8vc4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8vc4n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-8vc4n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4fefa93df35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:33.897434 env[1204]: 2025-05-13 00:39:33.874 [INFO][3846] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Namespace="calico-system" Pod="csi-node-driver-8vc4n" WorkloadEndpoint="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.897434 env[1204]: 2025-05-13 00:39:33.874 [INFO][3846] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4fefa93df35 ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Namespace="calico-system" Pod="csi-node-driver-8vc4n" WorkloadEndpoint="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.897434 env[1204]: 2025-05-13 00:39:33.878 [INFO][3846] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Namespace="calico-system" Pod="csi-node-driver-8vc4n" WorkloadEndpoint="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.897434 env[1204]: 2025-05-13 00:39:33.878 [INFO][3846] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Namespace="calico-system" Pod="csi-node-driver-8vc4n" WorkloadEndpoint="localhost-k8s-csi--node--driver--8vc4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8vc4n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4", Pod:"csi-node-driver-8vc4n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4fefa93df35", MAC:"7a:1b:c3:c9:fe:b3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:33.897434 env[1204]: 2025-05-13 00:39:33.889 [INFO][3846] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4" Namespace="calico-system" Pod="csi-node-driver-8vc4n" WorkloadEndpoint="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:33.905000 audit[3892]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=3892 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:33.905000 audit[3892]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffe94396230 a2=0 a3=7ffe9439621c items=0 ppid=3224 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.905000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:33.907350 env[1204]: time="2025-05-13T00:39:33.907203100Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:33.907350 env[1204]: time="2025-05-13T00:39:33.907261580Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:33.907350 env[1204]: time="2025-05-13T00:39:33.907281808Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:33.907439 env[1204]: time="2025-05-13T00:39:33.907395622Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4 pid=3896 runtime=io.containerd.runc.v2 May 13 00:39:33.923378 systemd[1]: run-containerd-runc-k8s.io-8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4-runc.NryZZy.mount: Deactivated successfully. May 13 00:39:33.926048 systemd[1]: Started cri-containerd-8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4.scope. May 13 00:39:33.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit: BPF prog-id=174 op=LOAD May 13 00:39:33.934000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3896 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626533303338316463383136313337303864353438643931333433 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3896 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626533303338316463383136313337303864353438643931333433 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.934000 audit: BPF prog-id=175 op=LOAD May 13 00:39:33.934000 audit[3906]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003be000 items=0 ppid=3896 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626533303338316463383136313337303864353438643931333433 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit: BPF prog-id=176 op=LOAD May 13 00:39:33.935000 audit[3906]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003be048 items=0 ppid=3896 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626533303338316463383136313337303864353438643931333433 May 13 00:39:33.935000 audit: BPF prog-id=176 op=UNLOAD May 13 00:39:33.935000 audit: BPF prog-id=175 op=UNLOAD May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:33.935000 audit: BPF prog-id=177 op=LOAD May 13 00:39:33.935000 audit[3906]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003be458 items=0 ppid=3896 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:33.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864626533303338316463383136313337303864353438643931333433 May 13 00:39:33.936687 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:39:33.946567 env[1204]: time="2025-05-13T00:39:33.946505813Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8vc4n,Uid:e3a12862-3ba4-45d9-a86a-f2a0e492dbe1,Namespace:calico-system,Attempt:1,} returns sandbox id \"8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4\"" May 13 00:39:34.634120 systemd-networkd[1032]: cali0412f0e01c8: Gained IPv6LL May 13 00:39:34.796241 kubelet[1946]: E0513 00:39:34.796209 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:34.810510 systemd[1]: Started sshd@10-10.0.0.18:22-10.0.0.1:40436.service. May 13 00:39:34.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.18:22-10.0.0.1:40436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:34.812056 kernel: kauditd_printk_skb: 825 callbacks suppressed May 13 00:39:34.812152 kernel: audit: type=1130 audit(1747096774.809:1234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.18:22-10.0.0.1:40436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:34.853000 audit[3932]: USER_ACCT pid=3932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.854386 sshd[3932]: Accepted publickey for core from 10.0.0.1 port 40436 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:34.856514 sshd[3932]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:34.855000 audit[3932]: CRED_ACQ pid=3932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.862624 systemd-logind[1194]: New session 11 of user core. May 13 00:39:34.863302 kernel: audit: type=1101 audit(1747096774.853:1235): pid=3932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.863338 kernel: audit: type=1103 audit(1747096774.855:1236): pid=3932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.863358 kernel: audit: type=1006 audit(1747096774.855:1237): pid=3932 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 13 00:39:34.863670 systemd[1]: Started session-11.scope. May 13 00:39:34.865554 kernel: audit: type=1300 audit(1747096774.855:1237): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd5ae65a0 a2=3 a3=0 items=0 ppid=1 pid=3932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:34.855000 audit[3932]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd5ae65a0 a2=3 a3=0 items=0 ppid=1 pid=3932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:34.855000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:34.872175 kernel: audit: type=1327 audit(1747096774.855:1237): proctitle=737368643A20636F7265205B707269765D May 13 00:39:34.867000 audit[3932]: USER_START pid=3932 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.878209 kernel: audit: type=1105 audit(1747096774.867:1238): pid=3932 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.878307 kernel: audit: type=1103 audit(1747096774.869:1239): pid=3934 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.869000 audit[3934]: CRED_ACQ pid=3934 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.890601 systemd-networkd[1032]: cali529ea2a0f58: Gained IPv6LL May 13 00:39:34.984413 sshd[3932]: pam_unix(sshd:session): session closed for user core May 13 00:39:34.984000 audit[3932]: USER_END pid=3932 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.987621 systemd[1]: sshd@10-10.0.0.18:22-10.0.0.1:40436.service: Deactivated successfully. May 13 00:39:34.988209 systemd[1]: session-11.scope: Deactivated successfully. May 13 00:39:34.989848 systemd[1]: Started sshd@11-10.0.0.18:22-10.0.0.1:40446.service. May 13 00:39:34.996328 kernel: audit: type=1106 audit(1747096774.984:1240): pid=3932 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.996404 kernel: audit: type=1104 audit(1747096774.984:1241): pid=3932 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.984000 audit[3932]: CRED_DISP pid=3932 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:34.992693 systemd-logind[1194]: Session 11 logged out. Waiting for processes to exit. May 13 00:39:34.993784 systemd-logind[1194]: Removed session 11. May 13 00:39:34.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.18:22-10.0.0.1:40436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:34.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.18:22-10.0.0.1:40446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.033000 audit[3946]: USER_ACCT pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.034178 sshd[3946]: Accepted publickey for core from 10.0.0.1 port 40446 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:35.034000 audit[3946]: CRED_ACQ pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.034000 audit[3946]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed3b42b10 a2=3 a3=0 items=0 ppid=1 pid=3946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:35.034000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:35.035240 sshd[3946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:35.039207 systemd-logind[1194]: New session 12 of user core. May 13 00:39:35.040393 systemd[1]: Started session-12.scope. May 13 00:39:35.044000 audit[3946]: USER_START pid=3946 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.046000 audit[3948]: CRED_ACQ pid=3948 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.147187 systemd-networkd[1032]: cali82b7aa16480: Gained IPv6LL May 13 00:39:35.199760 sshd[3946]: pam_unix(sshd:session): session closed for user core May 13 00:39:35.202000 audit[3946]: USER_END pid=3946 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.18:22-10.0.0.1:40450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.203861 systemd[1]: Started sshd@12-10.0.0.18:22-10.0.0.1:40450.service. May 13 00:39:35.205000 audit[3946]: CRED_DISP pid=3946 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.207617 systemd[1]: sshd@11-10.0.0.18:22-10.0.0.1:40446.service: Deactivated successfully. May 13 00:39:35.208348 systemd[1]: session-12.scope: Deactivated successfully. May 13 00:39:35.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.18:22-10.0.0.1:40446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.209405 systemd-logind[1194]: Session 12 logged out. Waiting for processes to exit. May 13 00:39:35.210603 systemd-logind[1194]: Removed session 12. May 13 00:39:35.252000 audit[3957]: USER_ACCT pid=3957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.253456 sshd[3957]: Accepted publickey for core from 10.0.0.1 port 40450 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:35.253000 audit[3957]: CRED_ACQ pid=3957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.253000 audit[3957]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce15a1e20 a2=3 a3=0 items=0 ppid=1 pid=3957 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:35.253000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:35.254618 sshd[3957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:35.258620 systemd-logind[1194]: New session 13 of user core. May 13 00:39:35.259365 systemd[1]: Started session-13.scope. May 13 00:39:35.263000 audit[3957]: USER_START pid=3957 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.264000 audit[3960]: CRED_ACQ pid=3960 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.381182 sshd[3957]: pam_unix(sshd:session): session closed for user core May 13 00:39:35.381000 audit[3957]: USER_END pid=3957 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.381000 audit[3957]: CRED_DISP pid=3957 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:35.384152 systemd[1]: sshd@12-10.0.0.18:22-10.0.0.1:40450.service: Deactivated successfully. May 13 00:39:35.385261 systemd[1]: session-13.scope: Deactivated successfully. May 13 00:39:35.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.18:22-10.0.0.1:40450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:35.386161 systemd-logind[1194]: Session 13 logged out. Waiting for processes to exit. May 13 00:39:35.387183 systemd-logind[1194]: Removed session 13. May 13 00:39:35.487129 env[1204]: time="2025-05-13T00:39:35.486271831Z" level=info msg="StopPodSandbox for \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\"" May 13 00:39:35.487641 env[1204]: time="2025-05-13T00:39:35.487585560Z" level=info msg="StopPodSandbox for \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\"" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.554 [INFO][4004] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.554 [INFO][4004] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" iface="eth0" netns="/var/run/netns/cni-5716bebd-78f4-0669-3342-9db7583139d5" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.554 [INFO][4004] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" iface="eth0" netns="/var/run/netns/cni-5716bebd-78f4-0669-3342-9db7583139d5" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.555 [INFO][4004] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" iface="eth0" netns="/var/run/netns/cni-5716bebd-78f4-0669-3342-9db7583139d5" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.555 [INFO][4004] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.555 [INFO][4004] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.687 [INFO][4025] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.687 [INFO][4025] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.687 [INFO][4025] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.693 [WARNING][4025] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.693 [INFO][4025] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.695 [INFO][4025] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:35.699727 env[1204]: 2025-05-13 00:39:35.698 [INFO][4004] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:35.700461 env[1204]: time="2025-05-13T00:39:35.700431052Z" level=info msg="TearDown network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\" successfully" May 13 00:39:35.700542 env[1204]: time="2025-05-13T00:39:35.700521442Z" level=info msg="StopPodSandbox for \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\" returns successfully" May 13 00:39:35.700946 kubelet[1946]: E0513 00:39:35.700916 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:35.701565 env[1204]: time="2025-05-13T00:39:35.701518916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hpvlr,Uid:04d6ce06-a96b-4d68-aeab-4e281e1f4fcb,Namespace:kube-system,Attempt:1,}" May 13 00:39:35.702828 systemd[1]: run-netns-cni\x2d5716bebd\x2d78f4\x2d0669\x2d3342\x2d9db7583139d5.mount: Deactivated successfully. May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.557 [INFO][4003] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.557 [INFO][4003] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" iface="eth0" netns="/var/run/netns/cni-33dc4a1a-d825-60da-59f0-29289800f236" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.557 [INFO][4003] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" iface="eth0" netns="/var/run/netns/cni-33dc4a1a-d825-60da-59f0-29289800f236" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.557 [INFO][4003] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" iface="eth0" netns="/var/run/netns/cni-33dc4a1a-d825-60da-59f0-29289800f236" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.557 [INFO][4003] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.557 [INFO][4003] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.687 [INFO][4031] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.687 [INFO][4031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.695 [INFO][4031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.700 [WARNING][4031] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.700 [INFO][4031] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.702 [INFO][4031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:35.707010 env[1204]: 2025-05-13 00:39:35.705 [INFO][4003] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:35.707395 env[1204]: time="2025-05-13T00:39:35.707175698Z" level=info msg="TearDown network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\" successfully" May 13 00:39:35.707395 env[1204]: time="2025-05-13T00:39:35.707205654Z" level=info msg="StopPodSandbox for \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\" returns successfully" May 13 00:39:35.708063 env[1204]: time="2025-05-13T00:39:35.708036837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-75c768cf7-66sf4,Uid:ea02011d-117d-451e-84fb-5fdb7db708a7,Namespace:calico-system,Attempt:1,}" May 13 00:39:35.709222 systemd[1]: run-netns-cni\x2d33dc4a1a\x2dd825\x2d60da\x2d59f0\x2d29289800f236.mount: Deactivated successfully. May 13 00:39:35.870358 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:39:35.870808 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0d872ad9630: link becomes ready May 13 00:39:35.869012 systemd-networkd[1032]: cali0d872ad9630: Link UP May 13 00:39:35.870584 systemd-networkd[1032]: cali0d872ad9630: Gained carrier May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.776 [INFO][4041] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0 coredns-6f6b679f8f- kube-system 04d6ce06-a96b-4d68-aeab-4e281e1f4fcb 956 0 2025-05-13 00:38:59 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-hpvlr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0d872ad9630 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-hpvlr" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hpvlr-" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.776 [INFO][4041] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-hpvlr" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.821 [INFO][4068] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" HandleID="k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.832 [INFO][4068] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" HandleID="k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012b5d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-hpvlr", "timestamp":"2025-05-13 00:39:35.821676096 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.832 [INFO][4068] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.832 [INFO][4068] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.832 [INFO][4068] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.837 [INFO][4068] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.841 [INFO][4068] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.845 [INFO][4068] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.846 [INFO][4068] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.848 [INFO][4068] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.848 [INFO][4068] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.850 [INFO][4068] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.854 [INFO][4068] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.861 [INFO][4068] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.861 [INFO][4068] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" host="localhost" May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.861 [INFO][4068] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:35.883439 env[1204]: 2025-05-13 00:39:35.861 [INFO][4068] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" HandleID="k8s-pod-network.373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.886548 env[1204]: 2025-05-13 00:39:35.863 [INFO][4041] cni-plugin/k8s.go 386: Populated endpoint ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-hpvlr" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"04d6ce06-a96b-4d68-aeab-4e281e1f4fcb", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-hpvlr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d872ad9630", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:35.886548 env[1204]: 2025-05-13 00:39:35.863 [INFO][4041] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-hpvlr" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.886548 env[1204]: 2025-05-13 00:39:35.863 [INFO][4041] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0d872ad9630 ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-hpvlr" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.886548 env[1204]: 2025-05-13 00:39:35.871 [INFO][4041] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-hpvlr" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.886548 env[1204]: 2025-05-13 00:39:35.872 [INFO][4041] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-hpvlr" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"04d6ce06-a96b-4d68-aeab-4e281e1f4fcb", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd", Pod:"coredns-6f6b679f8f-hpvlr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d872ad9630", MAC:"96:08:b2:e5:64:a7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:35.886548 env[1204]: 2025-05-13 00:39:35.881 [INFO][4041] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd" Namespace="kube-system" Pod="coredns-6f6b679f8f-hpvlr" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:35.894000 audit[4100]: NETFILTER_CFG table=filter:109 family=2 entries=48 op=nft_register_chain pid=4100 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:35.894000 audit[4100]: SYSCALL arch=c000003e syscall=46 success=yes exit=23448 a0=3 a1=7ffe5f151eb0 a2=0 a3=7ffe5f151e9c items=0 ppid=3224 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:35.894000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:35.903120 env[1204]: time="2025-05-13T00:39:35.903029676Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:35.903120 env[1204]: time="2025-05-13T00:39:35.903079539Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:35.903120 env[1204]: time="2025-05-13T00:39:35.903092433Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:35.903362 env[1204]: time="2025-05-13T00:39:35.903255230Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd pid=4108 runtime=io.containerd.runc.v2 May 13 00:39:35.914464 systemd-networkd[1032]: cali4fefa93df35: Gained IPv6LL May 13 00:39:35.916578 systemd[1]: Started cri-containerd-373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd.scope. May 13 00:39:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.937000 audit: BPF prog-id=178 op=LOAD May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4108 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336465336633373731643634356235646263646562386335616362 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4108 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336465336633373731643634356235646263646562386335616362 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit: BPF prog-id=179 op=LOAD May 13 00:39:35.938000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002217d0 items=0 ppid=4108 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336465336633373731643634356235646263646562386335616362 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit: BPF prog-id=180 op=LOAD May 13 00:39:35.938000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221818 items=0 ppid=4108 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336465336633373731643634356235646263646562386335616362 May 13 00:39:35.938000 audit: BPF prog-id=180 op=UNLOAD May 13 00:39:35.938000 audit: BPF prog-id=179 op=UNLOAD May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:35.938000 audit: BPF prog-id=181 op=LOAD May 13 00:39:35.938000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221c28 items=0 ppid=4108 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:35.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336465336633373731643634356235646263646562386335616362 May 13 00:39:35.941727 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:39:35.979221 systemd-networkd[1032]: calife7c5b25232: Link UP May 13 00:39:35.980574 systemd-networkd[1032]: calife7c5b25232: Gained carrier May 13 00:39:35.980984 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calife7c5b25232: link becomes ready May 13 00:39:35.984120 env[1204]: time="2025-05-13T00:39:35.984036995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-hpvlr,Uid:04d6ce06-a96b-4d68-aeab-4e281e1f4fcb,Namespace:kube-system,Attempt:1,} returns sandbox id \"373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd\"" May 13 00:39:35.984638 kubelet[1946]: E0513 00:39:35.984610 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:35.986119 env[1204]: time="2025-05-13T00:39:35.986091025Z" level=info msg="CreateContainer within sandbox \"373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.820 [INFO][4050] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0 calico-kube-controllers-75c768cf7- calico-system ea02011d-117d-451e-84fb-5fdb7db708a7 957 0 2025-05-13 00:39:06 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:75c768cf7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-75c768cf7-66sf4 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calife7c5b25232 [] []}} ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Namespace="calico-system" Pod="calico-kube-controllers-75c768cf7-66sf4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.820 [INFO][4050] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Namespace="calico-system" Pod="calico-kube-controllers-75c768cf7-66sf4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.888 [INFO][4078] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" HandleID="k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.934 [INFO][4078] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" HandleID="k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000376e70), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-75c768cf7-66sf4", "timestamp":"2025-05-13 00:39:35.887994979 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.934 [INFO][4078] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.934 [INFO][4078] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.934 [INFO][4078] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.937 [INFO][4078] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.941 [INFO][4078] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.947 [INFO][4078] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.949 [INFO][4078] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.951 [INFO][4078] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.951 [INFO][4078] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.953 [INFO][4078] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300 May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.956 [INFO][4078] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.961 [INFO][4078] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.961 [INFO][4078] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" host="localhost" May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.961 [INFO][4078] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:35.998165 env[1204]: 2025-05-13 00:39:35.961 [INFO][4078] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" HandleID="k8s-pod-network.ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.998798 env[1204]: 2025-05-13 00:39:35.963 [INFO][4050] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Namespace="calico-system" Pod="calico-kube-controllers-75c768cf7-66sf4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0", GenerateName:"calico-kube-controllers-75c768cf7-", Namespace:"calico-system", SelfLink:"", UID:"ea02011d-117d-451e-84fb-5fdb7db708a7", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"75c768cf7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-75c768cf7-66sf4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calife7c5b25232", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:35.998798 env[1204]: 2025-05-13 00:39:35.964 [INFO][4050] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Namespace="calico-system" Pod="calico-kube-controllers-75c768cf7-66sf4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.998798 env[1204]: 2025-05-13 00:39:35.964 [INFO][4050] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calife7c5b25232 ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Namespace="calico-system" Pod="calico-kube-controllers-75c768cf7-66sf4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.998798 env[1204]: 2025-05-13 00:39:35.980 [INFO][4050] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Namespace="calico-system" Pod="calico-kube-controllers-75c768cf7-66sf4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:35.998798 env[1204]: 2025-05-13 00:39:35.981 [INFO][4050] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Namespace="calico-system" Pod="calico-kube-controllers-75c768cf7-66sf4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0", GenerateName:"calico-kube-controllers-75c768cf7-", Namespace:"calico-system", SelfLink:"", UID:"ea02011d-117d-451e-84fb-5fdb7db708a7", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"75c768cf7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300", Pod:"calico-kube-controllers-75c768cf7-66sf4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calife7c5b25232", MAC:"9e:48:b1:fe:29:1f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:35.998798 env[1204]: 2025-05-13 00:39:35.992 [INFO][4050] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300" Namespace="calico-system" Pod="calico-kube-controllers-75c768cf7-66sf4" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:36.000998 env[1204]: time="2025-05-13T00:39:36.000961764Z" level=info msg="CreateContainer within sandbox \"373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fe8d3ac0aeb80013ab6044e3389ed2d396140ef6341abee2e66b96f12c9d3758\"" May 13 00:39:36.002411 env[1204]: time="2025-05-13T00:39:36.002389678Z" level=info msg="StartContainer for \"fe8d3ac0aeb80013ab6044e3389ed2d396140ef6341abee2e66b96f12c9d3758\"" May 13 00:39:36.002000 audit[4151]: NETFILTER_CFG table=filter:110 family=2 entries=46 op=nft_register_chain pid=4151 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:39:36.002000 audit[4151]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7ffcd94e66c0 a2=0 a3=7ffcd94e66ac items=0 ppid=3224 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.002000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:39:36.017255 systemd[1]: Started cri-containerd-fe8d3ac0aeb80013ab6044e3389ed2d396140ef6341abee2e66b96f12c9d3758.scope. May 13 00:39:36.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit: BPF prog-id=182 op=LOAD May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4108 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386433616330616562383030313361623630343465333338396564 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4108 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386433616330616562383030313361623630343465333338396564 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit: BPF prog-id=183 op=LOAD May 13 00:39:36.028000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003823c0 items=0 ppid=4108 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386433616330616562383030313361623630343465333338396564 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.028000 audit: BPF prog-id=184 op=LOAD May 13 00:39:36.028000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000382408 items=0 ppid=4108 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386433616330616562383030313361623630343465333338396564 May 13 00:39:36.029000 audit: BPF prog-id=184 op=UNLOAD May 13 00:39:36.029000 audit: BPF prog-id=183 op=UNLOAD May 13 00:39:36.029000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { perfmon } for pid=4160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit[4160]: AVC avc: denied { bpf } for pid=4160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.029000 audit: BPF prog-id=185 op=LOAD May 13 00:39:36.029000 audit[4160]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000382818 items=0 ppid=4108 pid=4160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386433616330616562383030313361623630343465333338396564 May 13 00:39:36.033955 env[1204]: time="2025-05-13T00:39:36.033869967Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:39:36.033955 env[1204]: time="2025-05-13T00:39:36.033929789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:39:36.034071 env[1204]: time="2025-05-13T00:39:36.033939398Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:39:36.034219 env[1204]: time="2025-05-13T00:39:36.034149302Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300 pid=4189 runtime=io.containerd.runc.v2 May 13 00:39:36.045066 env[1204]: time="2025-05-13T00:39:36.045008298Z" level=info msg="StartContainer for \"fe8d3ac0aeb80013ab6044e3389ed2d396140ef6341abee2e66b96f12c9d3758\" returns successfully" May 13 00:39:36.048463 systemd[1]: Started cri-containerd-ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300.scope. May 13 00:39:36.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit: BPF prog-id=186 op=LOAD May 13 00:39:36.063000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4189 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346337366230356231666262333362656561316235343630393438 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4189 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346337366230356231666262333362656561316235343630393438 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.063000 audit: BPF prog-id=187 op=LOAD May 13 00:39:36.063000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003a7070 items=0 ppid=4189 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346337366230356231666262333362656561316235343630393438 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit: BPF prog-id=188 op=LOAD May 13 00:39:36.064000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003a70b8 items=0 ppid=4189 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346337366230356231666262333362656561316235343630393438 May 13 00:39:36.064000 audit: BPF prog-id=188 op=UNLOAD May 13 00:39:36.064000 audit: BPF prog-id=187 op=UNLOAD May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:36.064000 audit: BPF prog-id=189 op=LOAD May 13 00:39:36.064000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003a74c8 items=0 ppid=4189 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:36.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346337366230356231666262333362656561316235343630393438 May 13 00:39:36.065797 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:39:36.094326 env[1204]: time="2025-05-13T00:39:36.094284221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-75c768cf7-66sf4,Uid:ea02011d-117d-451e-84fb-5fdb7db708a7,Namespace:calico-system,Attempt:1,} returns sandbox id \"ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300\"" May 13 00:39:36.801284 kubelet[1946]: E0513 00:39:36.801249 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:36.911062 kubelet[1946]: I0513 00:39:36.910633 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-hpvlr" podStartSLOduration=37.910617133 podStartE2EDuration="37.910617133s" podCreationTimestamp="2025-05-13 00:38:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:39:36.910516794 +0000 UTC m=+42.537510043" watchObservedRunningTime="2025-05-13 00:39:36.910617133 +0000 UTC m=+42.537610381" May 13 00:39:37.002332 systemd-networkd[1032]: cali0d872ad9630: Gained IPv6LL May 13 00:39:37.066130 systemd-networkd[1032]: calife7c5b25232: Gained IPv6LL May 13 00:39:37.137000 audit[4239]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.137000 audit[4239]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd92c9c460 a2=0 a3=7ffd92c9c44c items=0 ppid=2074 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.142000 audit[4239]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.142000 audit[4239]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd92c9c460 a2=0 a3=7ffd92c9c44c items=0 ppid=2074 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.160000 audit[4241]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.160000 audit[4241]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff20dd3280 a2=0 a3=7fff20dd326c items=0 ppid=2074 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.172000 audit[4241]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:37.172000 audit[4241]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff20dd3280 a2=0 a3=7fff20dd326c items=0 ppid=2074 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:37.406759 env[1204]: time="2025-05-13T00:39:37.406561151Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:37.486888 env[1204]: time="2025-05-13T00:39:37.486830573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:37.530347 env[1204]: time="2025-05-13T00:39:37.530306138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:37.584463 env[1204]: time="2025-05-13T00:39:37.584413370Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:37.585288 env[1204]: time="2025-05-13T00:39:37.585255842Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:39:37.586332 env[1204]: time="2025-05-13T00:39:37.586303992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:39:37.587404 env[1204]: time="2025-05-13T00:39:37.587356629Z" level=info msg="CreateContainer within sandbox \"64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:39:37.811547 kubelet[1946]: E0513 00:39:37.811464 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:37.828972 env[1204]: time="2025-05-13T00:39:37.828860686Z" level=info msg="CreateContainer within sandbox \"64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0b700a88c8638d368e000fc108c7bc931459134f73c4c26e420dfd98cbf7bcbc\"" May 13 00:39:37.829739 env[1204]: time="2025-05-13T00:39:37.829672752Z" level=info msg="StartContainer for \"0b700a88c8638d368e000fc108c7bc931459134f73c4c26e420dfd98cbf7bcbc\"" May 13 00:39:37.857046 systemd[1]: run-containerd-runc-k8s.io-0b700a88c8638d368e000fc108c7bc931459134f73c4c26e420dfd98cbf7bcbc-runc.t01znh.mount: Deactivated successfully. May 13 00:39:37.862234 systemd[1]: Started cri-containerd-0b700a88c8638d368e000fc108c7bc931459134f73c4c26e420dfd98cbf7bcbc.scope. May 13 00:39:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.877000 audit: BPF prog-id=190 op=LOAD May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3622 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373030613838633836333864333638653030306663313038633762 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3622 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373030613838633836333864333638653030306663313038633762 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit: BPF prog-id=191 op=LOAD May 13 00:39:37.878000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000255fb0 items=0 ppid=3622 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373030613838633836333864333638653030306663313038633762 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit: BPF prog-id=192 op=LOAD May 13 00:39:37.878000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000255ff8 items=0 ppid=3622 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373030613838633836333864333638653030306663313038633762 May 13 00:39:37.878000 audit: BPF prog-id=192 op=UNLOAD May 13 00:39:37.878000 audit: BPF prog-id=191 op=UNLOAD May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:37.878000 audit: BPF prog-id=193 op=LOAD May 13 00:39:37.878000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2408 items=0 ppid=3622 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:37.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062373030613838633836333864333638653030306663313038633762 May 13 00:39:37.909126 env[1204]: time="2025-05-13T00:39:37.909036854Z" level=info msg="StartContainer for \"0b700a88c8638d368e000fc108c7bc931459134f73c4c26e420dfd98cbf7bcbc\" returns successfully" May 13 00:39:38.003046 env[1204]: time="2025-05-13T00:39:38.002993025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:38.005940 env[1204]: time="2025-05-13T00:39:38.005855854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:38.008806 env[1204]: time="2025-05-13T00:39:38.008747166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:38.011230 env[1204]: time="2025-05-13T00:39:38.011167654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:38.011752 env[1204]: time="2025-05-13T00:39:38.011694124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:39:38.020883 env[1204]: time="2025-05-13T00:39:38.020803710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:39:38.022516 env[1204]: time="2025-05-13T00:39:38.022472797Z" level=info msg="CreateContainer within sandbox \"0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:39:38.040449 env[1204]: time="2025-05-13T00:39:38.040373099Z" level=info msg="CreateContainer within sandbox \"0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"80e1e2887e48b4bedef526a4018f71ed14fb7185001c1be46d57efbfc55e8735\"" May 13 00:39:38.041290 env[1204]: time="2025-05-13T00:39:38.041211915Z" level=info msg="StartContainer for \"80e1e2887e48b4bedef526a4018f71ed14fb7185001c1be46d57efbfc55e8735\"" May 13 00:39:38.064006 systemd[1]: Started cri-containerd-80e1e2887e48b4bedef526a4018f71ed14fb7185001c1be46d57efbfc55e8735.scope. May 13 00:39:38.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit: BPF prog-id=194 op=LOAD May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3791 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653165323838376534386234626564656635323661343031386637 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3791 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653165323838376534386234626564656635323661343031386637 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit: BPF prog-id=195 op=LOAD May 13 00:39:38.090000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002f0670 items=0 ppid=3791 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653165323838376534386234626564656635323661343031386637 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit: BPF prog-id=196 op=LOAD May 13 00:39:38.090000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002f06b8 items=0 ppid=3791 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653165323838376534386234626564656635323661343031386637 May 13 00:39:38.090000 audit: BPF prog-id=196 op=UNLOAD May 13 00:39:38.090000 audit: BPF prog-id=195 op=UNLOAD May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:38.090000 audit: BPF prog-id=197 op=LOAD May 13 00:39:38.090000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002f0ac8 items=0 ppid=3791 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653165323838376534386234626564656635323661343031386637 May 13 00:39:38.123776 env[1204]: time="2025-05-13T00:39:38.123689243Z" level=info msg="StartContainer for \"80e1e2887e48b4bedef526a4018f71ed14fb7185001c1be46d57efbfc55e8735\" returns successfully" May 13 00:39:38.773000 audit[4261]: AVC avc: denied { watch } for pid=4261 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_39_18.2317356451/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c6,c756 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c6,c756 tclass=file permissive=0 May 13 00:39:38.773000 audit[4261]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000be2060 a2=fc6 a3=0 items=0 ppid=3622 pid=4261 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c6,c756 key=(null) May 13 00:39:38.773000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:39:38.816113 kubelet[1946]: E0513 00:39:38.816072 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:38.835000 audit[4299]: AVC avc: denied { watch } for pid=4299 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_39_18.3070577103/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c90,c603 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c90,c603 tclass=file permissive=0 May 13 00:39:38.835000 audit[4299]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c98100 a2=fc6 a3=0 items=0 ppid=3791 pid=4299 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c90,c603 key=(null) May 13 00:39:38.835000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:39:38.840458 kubelet[1946]: I0513 00:39:38.840354 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-b4z98" podStartSLOduration=28.445465658 podStartE2EDuration="32.840335613s" podCreationTimestamp="2025-05-13 00:39:06 +0000 UTC" firstStartedPulling="2025-05-13 00:39:33.618598903 +0000 UTC m=+39.245592151" lastFinishedPulling="2025-05-13 00:39:38.013468858 +0000 UTC m=+43.640462106" observedRunningTime="2025-05-13 00:39:38.829883344 +0000 UTC m=+44.456876592" watchObservedRunningTime="2025-05-13 00:39:38.840335613 +0000 UTC m=+44.467328861" May 13 00:39:38.840745 kubelet[1946]: I0513 00:39:38.840718 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bdf86dbbc-nhnf5" podStartSLOduration=28.596926427 podStartE2EDuration="32.840714535s" podCreationTimestamp="2025-05-13 00:39:06 +0000 UTC" firstStartedPulling="2025-05-13 00:39:33.342362506 +0000 UTC m=+38.969355754" lastFinishedPulling="2025-05-13 00:39:37.586150623 +0000 UTC m=+43.213143862" observedRunningTime="2025-05-13 00:39:38.840436472 +0000 UTC m=+44.467429710" watchObservedRunningTime="2025-05-13 00:39:38.840714535 +0000 UTC m=+44.467707783" May 13 00:39:38.842000 audit[4319]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:38.842000 audit[4319]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc389fe1f0 a2=0 a3=7ffc389fe1dc items=0 ppid=2074 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:38.847000 audit[4319]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:38.847000 audit[4319]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc389fe1f0 a2=0 a3=7ffc389fe1dc items=0 ppid=2074 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:38.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:39.818009 kubelet[1946]: I0513 00:39:39.817975 1946 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:39:39.863000 audit[4321]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:39.865631 kernel: kauditd_printk_skb: 338 callbacks suppressed May 13 00:39:39.865698 kernel: audit: type=1325 audit(1747096779.863:1361): table=filter:117 family=2 entries=9 op=nft_register_rule pid=4321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:39.863000 audit[4321]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff9ef12020 a2=0 a3=7fff9ef1200c items=0 ppid=2074 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:39.872766 kernel: audit: type=1300 audit(1747096779.863:1361): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff9ef12020 a2=0 a3=7fff9ef1200c items=0 ppid=2074 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:39.872845 kernel: audit: type=1327 audit(1747096779.863:1361): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:39.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:39.876000 audit[4321]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:39.876000 audit[4321]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff9ef12020 a2=0 a3=7fff9ef1200c items=0 ppid=2074 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:39.887165 kernel: audit: type=1325 audit(1747096779.876:1362): table=nat:118 family=2 entries=27 op=nft_register_chain pid=4321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:39.887264 kernel: audit: type=1300 audit(1747096779.876:1362): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff9ef12020 a2=0 a3=7fff9ef1200c items=0 ppid=2074 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:39.887289 kernel: audit: type=1327 audit(1747096779.876:1362): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:39.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:40.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.18:22-10.0.0.1:54224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:40.386446 systemd[1]: Started sshd@13-10.0.0.18:22-10.0.0.1:54224.service. May 13 00:39:40.394967 kernel: audit: type=1130 audit(1747096780.385:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.18:22-10.0.0.1:54224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.117000 audit[4323]: USER_ACCT pid=4323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:41.123862 sshd[4323]: Accepted publickey for core from 10.0.0.1 port 54224 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:41.124571 kernel: audit: type=1101 audit(1747096781.117:1364): pid=4323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:41.124000 audit[4323]: CRED_ACQ pid=4323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:41.125576 sshd[4323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:41.134053 kernel: audit: type=1103 audit(1747096781.124:1365): pid=4323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:41.134229 kernel: audit: type=1006 audit(1747096781.124:1366): pid=4323 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 13 00:39:41.130753 systemd-logind[1194]: New session 14 of user core. May 13 00:39:41.131052 systemd[1]: Started session-14.scope. May 13 00:39:41.124000 audit[4323]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0f4b5ba0 a2=3 a3=0 items=0 ppid=1 pid=4323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:41.124000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:41.136000 audit[4323]: USER_START pid=4323 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:41.138000 audit[4333]: CRED_ACQ pid=4333 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:41.316590 sshd[4323]: pam_unix(sshd:session): session closed for user core May 13 00:39:41.316000 audit[4323]: USER_END pid=4323 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:41.317000 audit[4323]: CRED_DISP pid=4323 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:41.320080 systemd[1]: sshd@13-10.0.0.18:22-10.0.0.1:54224.service: Deactivated successfully. May 13 00:39:41.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.18:22-10.0.0.1:54224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:41.322046 systemd[1]: session-14.scope: Deactivated successfully. May 13 00:39:41.322145 systemd-logind[1194]: Session 14 logged out. Waiting for processes to exit. May 13 00:39:41.323496 systemd-logind[1194]: Removed session 14. May 13 00:39:41.688154 env[1204]: time="2025-05-13T00:39:41.688084691Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:41.756966 env[1204]: time="2025-05-13T00:39:41.756912782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:41.771730 env[1204]: time="2025-05-13T00:39:41.771677258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:41.807828 env[1204]: time="2025-05-13T00:39:41.807784244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:41.808500 env[1204]: time="2025-05-13T00:39:41.808472346Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 00:39:41.810212 env[1204]: time="2025-05-13T00:39:41.810185625Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 00:39:41.811121 env[1204]: time="2025-05-13T00:39:41.811070728Z" level=info msg="CreateContainer within sandbox \"8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:39:42.338687 env[1204]: time="2025-05-13T00:39:42.338605587Z" level=info msg="CreateContainer within sandbox \"8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9fe2ddbbb2d311426a7cf081a57755790f48be2b05b1e43e67d3cc989723532d\"" May 13 00:39:42.339373 env[1204]: time="2025-05-13T00:39:42.339315181Z" level=info msg="StartContainer for \"9fe2ddbbb2d311426a7cf081a57755790f48be2b05b1e43e67d3cc989723532d\"" May 13 00:39:42.360274 systemd[1]: Started cri-containerd-9fe2ddbbb2d311426a7cf081a57755790f48be2b05b1e43e67d3cc989723532d.scope. May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f962657e6a8 items=0 ppid=3896 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653264646262623264333131343236613763663038316135373735 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit: BPF prog-id=198 op=LOAD May 13 00:39:42.377000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003f8308 items=0 ppid=3896 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653264646262623264333131343236613763663038316135373735 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit: BPF prog-id=199 op=LOAD May 13 00:39:42.377000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003f8358 items=0 ppid=3896 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653264646262623264333131343236613763663038316135373735 May 13 00:39:42.377000 audit: BPF prog-id=199 op=UNLOAD May 13 00:39:42.377000 audit: BPF prog-id=198 op=UNLOAD May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:42.377000 audit: BPF prog-id=200 op=LOAD May 13 00:39:42.377000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003f83e8 items=0 ppid=3896 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:42.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653264646262623264333131343236613763663038316135373735 May 13 00:39:42.658572 env[1204]: time="2025-05-13T00:39:42.658410504Z" level=info msg="StartContainer for \"9fe2ddbbb2d311426a7cf081a57755790f48be2b05b1e43e67d3cc989723532d\" returns successfully" May 13 00:39:45.152470 env[1204]: time="2025-05-13T00:39:45.152417190Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:45.154687 env[1204]: time="2025-05-13T00:39:45.154622923Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:45.156959 env[1204]: time="2025-05-13T00:39:45.156932371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:45.159016 env[1204]: time="2025-05-13T00:39:45.158989404Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:45.159551 env[1204]: time="2025-05-13T00:39:45.159523286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 13 00:39:45.160742 env[1204]: time="2025-05-13T00:39:45.160719212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:39:45.166887 env[1204]: time="2025-05-13T00:39:45.166846930Z" level=info msg="CreateContainer within sandbox \"ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:39:45.183991 env[1204]: time="2025-05-13T00:39:45.183950180Z" level=info msg="CreateContainer within sandbox \"ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b39841031ac73a5fc369eb7d1b442fb7790a39da4217971fa4b6a8d6837128c2\"" May 13 00:39:45.184433 env[1204]: time="2025-05-13T00:39:45.184403922Z" level=info msg="StartContainer for \"b39841031ac73a5fc369eb7d1b442fb7790a39da4217971fa4b6a8d6837128c2\"" May 13 00:39:45.198711 systemd[1]: Started cri-containerd-b39841031ac73a5fc369eb7d1b442fb7790a39da4217971fa4b6a8d6837128c2.scope. May 13 00:39:45.215818 kernel: kauditd_printk_skb: 50 callbacks suppressed May 13 00:39:45.215979 kernel: audit: type=1400 audit(1747096785.209:1378): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.216006 kernel: audit: type=1400 audit(1747096785.209:1379): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.221617 kernel: audit: type=1400 audit(1747096785.209:1380): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.225109 kernel: audit: type=1400 audit(1747096785.209:1381): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.228558 kernel: audit: type=1400 audit(1747096785.209:1382): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.231954 kernel: audit: type=1400 audit(1747096785.209:1383): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.238937 kernel: audit: type=1400 audit(1747096785.209:1384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.238990 kernel: audit: type=1400 audit(1747096785.209:1385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.245778 kernel: audit: type=1400 audit(1747096785.209:1386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.245820 kernel: audit: type=1400 audit(1747096785.214:1387): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit: BPF prog-id=201 op=LOAD May 13 00:39:45.214000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4189 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:45.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393834313033316163373361356663333639656237643162343432 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4189 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:45.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393834313033316163373361356663333639656237643162343432 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.214000 audit: BPF prog-id=202 op=LOAD May 13 00:39:45.214000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024910 items=0 ppid=4189 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:45.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393834313033316163373361356663333639656237643162343432 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.217000 audit: BPF prog-id=203 op=LOAD May 13 00:39:45.217000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024958 items=0 ppid=4189 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:45.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393834313033316163373361356663333639656237643162343432 May 13 00:39:45.220000 audit: BPF prog-id=203 op=UNLOAD May 13 00:39:45.220000 audit: BPF prog-id=202 op=UNLOAD May 13 00:39:45.220000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:45.220000 audit: BPF prog-id=204 op=LOAD May 13 00:39:45.220000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024d68 items=0 ppid=4189 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:45.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393834313033316163373361356663333639656237643162343432 May 13 00:39:45.261730 env[1204]: time="2025-05-13T00:39:45.261691409Z" level=info msg="StartContainer for \"b39841031ac73a5fc369eb7d1b442fb7790a39da4217971fa4b6a8d6837128c2\" returns successfully" May 13 00:39:45.846160 kubelet[1946]: I0513 00:39:45.846093 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-75c768cf7-66sf4" podStartSLOduration=30.781255876 podStartE2EDuration="39.84607516s" podCreationTimestamp="2025-05-13 00:39:06 +0000 UTC" firstStartedPulling="2025-05-13 00:39:36.095626514 +0000 UTC m=+41.722619762" lastFinishedPulling="2025-05-13 00:39:45.160445808 +0000 UTC m=+50.787439046" observedRunningTime="2025-05-13 00:39:45.844255021 +0000 UTC m=+51.471248269" watchObservedRunningTime="2025-05-13 00:39:45.84607516 +0000 UTC m=+51.473068408" May 13 00:39:46.321108 systemd[1]: Started sshd@14-10.0.0.18:22-10.0.0.1:54232.service. May 13 00:39:46.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.18:22-10.0.0.1:54232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:46.363000 audit[4443]: USER_ACCT pid=4443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:46.364139 sshd[4443]: Accepted publickey for core from 10.0.0.1 port 54232 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:46.364000 audit[4443]: CRED_ACQ pid=4443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:46.364000 audit[4443]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe561e93a0 a2=3 a3=0 items=0 ppid=1 pid=4443 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:46.364000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:46.365413 sshd[4443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:46.368815 systemd-logind[1194]: New session 15 of user core. May 13 00:39:46.369665 systemd[1]: Started session-15.scope. May 13 00:39:46.372000 audit[4443]: USER_START pid=4443 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:46.373000 audit[4445]: CRED_ACQ pid=4445 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:46.498778 sshd[4443]: pam_unix(sshd:session): session closed for user core May 13 00:39:46.498000 audit[4443]: USER_END pid=4443 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:46.498000 audit[4443]: CRED_DISP pid=4443 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:46.501089 systemd[1]: sshd@14-10.0.0.18:22-10.0.0.1:54232.service: Deactivated successfully. May 13 00:39:46.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.18:22-10.0.0.1:54232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:46.501942 systemd[1]: session-15.scope: Deactivated successfully. May 13 00:39:46.502479 systemd-logind[1194]: Session 15 logged out. Waiting for processes to exit. May 13 00:39:46.503208 systemd-logind[1194]: Removed session 15. May 13 00:39:47.637835 env[1204]: time="2025-05-13T00:39:47.637766307Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:47.640014 env[1204]: time="2025-05-13T00:39:47.639966799Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:47.641859 env[1204]: time="2025-05-13T00:39:47.641819146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:47.643333 env[1204]: time="2025-05-13T00:39:47.643295679Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:39:47.643687 env[1204]: time="2025-05-13T00:39:47.643649965Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 00:39:47.645560 env[1204]: time="2025-05-13T00:39:47.645520447Z" level=info msg="CreateContainer within sandbox \"8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:39:47.661449 env[1204]: time="2025-05-13T00:39:47.661389487Z" level=info msg="CreateContainer within sandbox \"8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"31c2f17d8af02628f89fef0d4320f0fc21134487660d6cdd6641d447f14ffa85\"" May 13 00:39:47.661983 env[1204]: time="2025-05-13T00:39:47.661887050Z" level=info msg="StartContainer for \"31c2f17d8af02628f89fef0d4320f0fc21134487660d6cdd6641d447f14ffa85\"" May 13 00:39:47.685286 systemd[1]: Started cri-containerd-31c2f17d8af02628f89fef0d4320f0fc21134487660d6cdd6641d447f14ffa85.scope. May 13 00:39:47.698000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f1458566728 items=0 ppid=3896 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633266313764386166303236323866383966656630643433323066 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.698000 audit: BPF prog-id=205 op=LOAD May 13 00:39:47.698000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003cc318 items=0 ppid=3896 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633266313764386166303236323866383966656630643433323066 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit: BPF prog-id=206 op=LOAD May 13 00:39:47.699000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003cc368 items=0 ppid=3896 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633266313764386166303236323866383966656630643433323066 May 13 00:39:47.699000 audit: BPF prog-id=206 op=UNLOAD May 13 00:39:47.699000 audit: BPF prog-id=205 op=UNLOAD May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:39:47.699000 audit: BPF prog-id=207 op=LOAD May 13 00:39:47.699000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003cc3f8 items=0 ppid=3896 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:47.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633266313764386166303236323866383966656630643433323066 May 13 00:39:47.712255 env[1204]: time="2025-05-13T00:39:47.712209728Z" level=info msg="StartContainer for \"31c2f17d8af02628f89fef0d4320f0fc21134487660d6cdd6641d447f14ffa85\" returns successfully" May 13 00:39:48.547260 kubelet[1946]: I0513 00:39:48.547229 1946 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:39:48.547260 kubelet[1946]: I0513 00:39:48.547265 1946 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:39:48.657512 systemd[1]: run-containerd-runc-k8s.io-31c2f17d8af02628f89fef0d4320f0fc21134487660d6cdd6641d447f14ffa85-runc.3Oyhrl.mount: Deactivated successfully. May 13 00:39:50.632956 kernel: kauditd_printk_skb: 101 callbacks suppressed May 13 00:39:50.633148 kernel: audit: type=1400 audit(1747096790.629:1411): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:50.629000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:50.629000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:50.641960 kernel: audit: type=1400 audit(1747096790.629:1412): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:50.642156 kernel: audit: type=1300 audit(1747096790.629:1411): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000924bc0 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:39:50.629000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000924bc0 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:39:50.629000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017ea690 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:39:50.654297 kernel: audit: type=1300 audit(1747096790.629:1412): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017ea690 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:39:50.654492 kernel: audit: type=1327 audit(1747096790.629:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:39:50.629000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:39:50.659193 kernel: audit: type=1327 audit(1747096790.629:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:39:50.629000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:39:51.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.18:22-10.0.0.1:49780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:51.504673 systemd[1]: Started sshd@15-10.0.0.18:22-10.0.0.1:49780.service. May 13 00:39:51.509944 kernel: audit: type=1130 audit(1747096791.503:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.18:22-10.0.0.1:49780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:51.554000 audit[4501]: USER_ACCT pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:51.556177 sshd[4501]: Accepted publickey for core from 10.0.0.1 port 49780 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:51.558891 sshd[4501]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:51.557000 audit[4501]: CRED_ACQ pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:51.564995 kernel: audit: type=1101 audit(1747096791.554:1414): pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:51.565087 kernel: audit: type=1103 audit(1747096791.557:1415): pid=4501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:51.565005 systemd-logind[1194]: New session 16 of user core. May 13 00:39:51.566047 systemd[1]: Started session-16.scope. May 13 00:39:51.568271 kernel: audit: type=1006 audit(1747096791.557:1416): pid=4501 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 00:39:51.557000 audit[4501]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe67c52b30 a2=3 a3=0 items=0 ppid=1 pid=4501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:51.557000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:51.570000 audit[4501]: USER_START pid=4501 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:51.571000 audit[4503]: CRED_ACQ pid=4503 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:51.712216 sshd[4501]: pam_unix(sshd:session): session closed for user core May 13 00:39:51.712000 audit[4501]: USER_END pid=4501 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:51.712000 audit[4501]: CRED_DISP pid=4501 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:51.715092 systemd[1]: sshd@15-10.0.0.18:22-10.0.0.1:49780.service: Deactivated successfully. May 13 00:39:51.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.18:22-10.0.0.1:49780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:51.715865 systemd[1]: session-16.scope: Deactivated successfully. May 13 00:39:51.716555 systemd-logind[1194]: Session 16 logged out. Waiting for processes to exit. May 13 00:39:51.717345 systemd-logind[1194]: Removed session 16. May 13 00:39:51.952000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:51.952000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:51.952000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:51.952000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c008e0f320 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:39:51.952000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c006af0090 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:39:51.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:39:51.952000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00613e5d0 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:39:51.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:39:51.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:39:51.956000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:51.956000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00613e630 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:39:51.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:39:51.966000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7296 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:51.966000 audit[1822]: AVC avc: denied { watch } for pid=1822 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:51.966000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00607b8c0 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:39:51.966000 audit[1822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00613e750 a2=fc6 a3=0 items=0 ppid=1671 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c198,c918 key=(null) May 13 00:39:51.966000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:39:51.966000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:39:52.511109 kubelet[1946]: E0513 00:39:52.511071 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:39:52.523592 kubelet[1946]: I0513 00:39:52.523533 1946 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-8vc4n" podStartSLOduration=32.826865218 podStartE2EDuration="46.523516021s" podCreationTimestamp="2025-05-13 00:39:06 +0000 UTC" firstStartedPulling="2025-05-13 00:39:33.94766383 +0000 UTC m=+39.574657078" lastFinishedPulling="2025-05-13 00:39:47.644314633 +0000 UTC m=+53.271307881" observedRunningTime="2025-05-13 00:39:47.852838684 +0000 UTC m=+53.479831952" watchObservedRunningTime="2025-05-13 00:39:52.523516021 +0000 UTC m=+58.150509269" May 13 00:39:54.264000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:54.264000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c5cf60 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:39:54.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:39:54.264000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:54.264000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000924d00 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:39:54.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:39:54.264000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:54.264000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5cfe0 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:39:54.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:39:54.265000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:39:54.265000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000623da0 a2=fc6 a3=0 items=0 ppid=1686 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c831 key=(null) May 13 00:39:54.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:39:54.471629 env[1204]: time="2025-05-13T00:39:54.468995906Z" level=info msg="StopPodSandbox for \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\"" May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.532 [WARNING][4552] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0", GenerateName:"calico-apiserver-6bdf86dbbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"0a2a2bd3-12f7-4300-991c-bbe6ee3751df", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bdf86dbbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b", Pod:"calico-apiserver-6bdf86dbbc-nhnf5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82b7aa16480", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.532 [INFO][4552] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.532 [INFO][4552] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" iface="eth0" netns="" May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.532 [INFO][4552] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.533 [INFO][4552] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.561 [INFO][4562] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.562 [INFO][4562] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.562 [INFO][4562] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.569 [WARNING][4562] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.569 [INFO][4562] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.572 [INFO][4562] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:54.577629 env[1204]: 2025-05-13 00:39:54.574 [INFO][4552] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:54.577629 env[1204]: time="2025-05-13T00:39:54.577572017Z" level=info msg="TearDown network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\" successfully" May 13 00:39:54.577629 env[1204]: time="2025-05-13T00:39:54.577609577Z" level=info msg="StopPodSandbox for \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\" returns successfully" May 13 00:39:54.578501 env[1204]: time="2025-05-13T00:39:54.578413086Z" level=info msg="RemovePodSandbox for \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\"" May 13 00:39:54.578570 env[1204]: time="2025-05-13T00:39:54.578471215Z" level=info msg="Forcibly stopping sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\"" May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.625 [WARNING][4586] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0", GenerateName:"calico-apiserver-6bdf86dbbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"0a2a2bd3-12f7-4300-991c-bbe6ee3751df", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bdf86dbbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"64a82ba3e33e77caf724bed86fef221642c54deef7b91100ab27f9c8a1d8361b", Pod:"calico-apiserver-6bdf86dbbc-nhnf5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82b7aa16480", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.625 [INFO][4586] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.625 [INFO][4586] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" iface="eth0" netns="" May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.625 [INFO][4586] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.625 [INFO][4586] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.651 [INFO][4594] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.652 [INFO][4594] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.652 [INFO][4594] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.661 [WARNING][4594] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.661 [INFO][4594] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" HandleID="k8s-pod-network.ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--nhnf5-eth0" May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.663 [INFO][4594] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:54.671203 env[1204]: 2025-05-13 00:39:54.666 [INFO][4586] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc" May 13 00:39:54.672313 env[1204]: time="2025-05-13T00:39:54.672225641Z" level=info msg="TearDown network for sandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\" successfully" May 13 00:39:54.715151 env[1204]: time="2025-05-13T00:39:54.715063341Z" level=info msg="RemovePodSandbox \"ed2dc0d371d66f21f90d94c03f5371537f5afa42a07cd8c5712bb503d362decc\" returns successfully" May 13 00:39:54.715840 env[1204]: time="2025-05-13T00:39:54.715801127Z" level=info msg="StopPodSandbox for \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\"" May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.771 [WARNING][4617] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xjvld-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"04b0ee45-cb91-41bd-b95a-6ad53709a896", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698", Pod:"coredns-6f6b679f8f-xjvld", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali529ea2a0f58", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.771 [INFO][4617] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.771 [INFO][4617] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" iface="eth0" netns="" May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.771 [INFO][4617] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.771 [INFO][4617] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.811 [INFO][4625] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.811 [INFO][4625] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.811 [INFO][4625] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.820 [WARNING][4625] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.820 [INFO][4625] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.822 [INFO][4625] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:54.826710 env[1204]: 2025-05-13 00:39:54.824 [INFO][4617] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:54.827555 env[1204]: time="2025-05-13T00:39:54.827480193Z" level=info msg="TearDown network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\" successfully" May 13 00:39:54.827555 env[1204]: time="2025-05-13T00:39:54.827529295Z" level=info msg="StopPodSandbox for \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\" returns successfully" May 13 00:39:54.828299 env[1204]: time="2025-05-13T00:39:54.828172994Z" level=info msg="RemovePodSandbox for \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\"" May 13 00:39:54.828299 env[1204]: time="2025-05-13T00:39:54.828229991Z" level=info msg="Forcibly stopping sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\"" May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.872 [WARNING][4647] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xjvld-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"04b0ee45-cb91-41bd-b95a-6ad53709a896", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff66a70da15495f8f2b9b58cf12e9fb569729cc55d92aa5536756c829c884698", Pod:"coredns-6f6b679f8f-xjvld", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali529ea2a0f58", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.872 [INFO][4647] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.872 [INFO][4647] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" iface="eth0" netns="" May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.872 [INFO][4647] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.872 [INFO][4647] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.899 [INFO][4655] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.899 [INFO][4655] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.899 [INFO][4655] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.907 [WARNING][4655] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.907 [INFO][4655] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" HandleID="k8s-pod-network.53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" Workload="localhost-k8s-coredns--6f6b679f8f--xjvld-eth0" May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.909 [INFO][4655] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:54.913678 env[1204]: 2025-05-13 00:39:54.911 [INFO][4647] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782" May 13 00:39:54.914418 env[1204]: time="2025-05-13T00:39:54.913714462Z" level=info msg="TearDown network for sandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\" successfully" May 13 00:39:54.918218 env[1204]: time="2025-05-13T00:39:54.918166951Z" level=info msg="RemovePodSandbox \"53a25da31019354a37419fa5478dd6e1e0caf7415d4c66e64b6d8cb550524782\" returns successfully" May 13 00:39:54.918952 env[1204]: time="2025-05-13T00:39:54.918868558Z" level=info msg="StopPodSandbox for \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\"" May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.961 [WARNING][4678] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8vc4n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1", ResourceVersion:"1062", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4", Pod:"csi-node-driver-8vc4n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4fefa93df35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.961 [INFO][4678] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.961 [INFO][4678] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" iface="eth0" netns="" May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.961 [INFO][4678] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.961 [INFO][4678] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.987 [INFO][4686] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.987 [INFO][4686] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.987 [INFO][4686] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.995 [WARNING][4686] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.995 [INFO][4686] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.997 [INFO][4686] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:55.001189 env[1204]: 2025-05-13 00:39:54.999 [INFO][4678] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:55.002045 env[1204]: time="2025-05-13T00:39:55.001217453Z" level=info msg="TearDown network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\" successfully" May 13 00:39:55.002045 env[1204]: time="2025-05-13T00:39:55.001257328Z" level=info msg="StopPodSandbox for \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\" returns successfully" May 13 00:39:55.002124 env[1204]: time="2025-05-13T00:39:55.002057840Z" level=info msg="RemovePodSandbox for \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\"" May 13 00:39:55.002124 env[1204]: time="2025-05-13T00:39:55.002092646Z" level=info msg="Forcibly stopping sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\"" May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.046 [WARNING][4710] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--8vc4n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e3a12862-3ba4-45d9-a86a-f2a0e492dbe1", ResourceVersion:"1062", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8dbe30381dc81613708d548d91343e817e91c5bb877cc8af5983a4072fe3f6d4", Pod:"csi-node-driver-8vc4n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4fefa93df35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.047 [INFO][4710] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.047 [INFO][4710] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" iface="eth0" netns="" May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.047 [INFO][4710] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.047 [INFO][4710] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.075 [INFO][4718] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.075 [INFO][4718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.075 [INFO][4718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.083 [WARNING][4718] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.083 [INFO][4718] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" HandleID="k8s-pod-network.aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" Workload="localhost-k8s-csi--node--driver--8vc4n-eth0" May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.085 [INFO][4718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:55.089007 env[1204]: 2025-05-13 00:39:55.087 [INFO][4710] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a" May 13 00:39:55.089007 env[1204]: time="2025-05-13T00:39:55.088952074Z" level=info msg="TearDown network for sandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\" successfully" May 13 00:39:55.093585 env[1204]: time="2025-05-13T00:39:55.093489751Z" level=info msg="RemovePodSandbox \"aa8567441bc26ac3638fadde936251c245f17d18852495a45f2b89dd1b24c75a\" returns successfully" May 13 00:39:55.094241 env[1204]: time="2025-05-13T00:39:55.094187462Z" level=info msg="StopPodSandbox for \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\"" May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.139 [WARNING][4741] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0", GenerateName:"calico-apiserver-6bdf86dbbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"9012a999-4581-4546-b67f-ab4db466229c", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bdf86dbbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81", Pod:"calico-apiserver-6bdf86dbbc-b4z98", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0412f0e01c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.139 [INFO][4741] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.139 [INFO][4741] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" iface="eth0" netns="" May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.139 [INFO][4741] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.139 [INFO][4741] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.164 [INFO][4750] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.164 [INFO][4750] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.164 [INFO][4750] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.172 [WARNING][4750] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.172 [INFO][4750] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.176 [INFO][4750] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:55.179292 env[1204]: 2025-05-13 00:39:55.177 [INFO][4741] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:55.179760 env[1204]: time="2025-05-13T00:39:55.179343802Z" level=info msg="TearDown network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\" successfully" May 13 00:39:55.179760 env[1204]: time="2025-05-13T00:39:55.179394247Z" level=info msg="StopPodSandbox for \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\" returns successfully" May 13 00:39:55.180074 env[1204]: time="2025-05-13T00:39:55.180023868Z" level=info msg="RemovePodSandbox for \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\"" May 13 00:39:55.180125 env[1204]: time="2025-05-13T00:39:55.180072900Z" level=info msg="Forcibly stopping sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\"" May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.221 [WARNING][4773] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0", GenerateName:"calico-apiserver-6bdf86dbbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"9012a999-4581-4546-b67f-ab4db466229c", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bdf86dbbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0b42276d52d65127837fc802fc1537e2e180cfc32d43b77d6e3d5b3493265b81", Pod:"calico-apiserver-6bdf86dbbc-b4z98", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0412f0e01c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.221 [INFO][4773] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.221 [INFO][4773] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" iface="eth0" netns="" May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.221 [INFO][4773] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.221 [INFO][4773] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.245 [INFO][4781] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.245 [INFO][4781] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.245 [INFO][4781] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.252 [WARNING][4781] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.252 [INFO][4781] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" HandleID="k8s-pod-network.0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" Workload="localhost-k8s-calico--apiserver--6bdf86dbbc--b4z98-eth0" May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.254 [INFO][4781] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:55.258413 env[1204]: 2025-05-13 00:39:55.256 [INFO][4773] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232" May 13 00:39:55.259030 env[1204]: time="2025-05-13T00:39:55.258440968Z" level=info msg="TearDown network for sandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\" successfully" May 13 00:39:55.263045 env[1204]: time="2025-05-13T00:39:55.262970801Z" level=info msg="RemovePodSandbox \"0bd60ba7f941c30f01b05a11607c474b3dbd3c71aa034db55931876d9a64e232\" returns successfully" May 13 00:39:55.263692 env[1204]: time="2025-05-13T00:39:55.263615392Z" level=info msg="StopPodSandbox for \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\"" May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.305 [WARNING][4803] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"04d6ce06-a96b-4d68-aeab-4e281e1f4fcb", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd", Pod:"coredns-6f6b679f8f-hpvlr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d872ad9630", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.305 [INFO][4803] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.305 [INFO][4803] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" iface="eth0" netns="" May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.305 [INFO][4803] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.305 [INFO][4803] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.326 [INFO][4812] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.326 [INFO][4812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.326 [INFO][4812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.332 [WARNING][4812] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.332 [INFO][4812] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.334 [INFO][4812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:55.337856 env[1204]: 2025-05-13 00:39:55.336 [INFO][4803] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:55.338536 env[1204]: time="2025-05-13T00:39:55.337893060Z" level=info msg="TearDown network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\" successfully" May 13 00:39:55.338536 env[1204]: time="2025-05-13T00:39:55.337946611Z" level=info msg="StopPodSandbox for \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\" returns successfully" May 13 00:39:55.338607 env[1204]: time="2025-05-13T00:39:55.338546547Z" level=info msg="RemovePodSandbox for \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\"" May 13 00:39:55.338647 env[1204]: time="2025-05-13T00:39:55.338586572Z" level=info msg="Forcibly stopping sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\"" May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.380 [WARNING][4834] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"04d6ce06-a96b-4d68-aeab-4e281e1f4fcb", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 38, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"373de3f3771d645b5dbcdeb8c5acbfa4ae7afaf15feb8c7fb5cf34d186dcb5fd", Pod:"coredns-6f6b679f8f-hpvlr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0d872ad9630", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.380 [INFO][4834] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.380 [INFO][4834] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" iface="eth0" netns="" May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.380 [INFO][4834] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.380 [INFO][4834] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.406 [INFO][4842] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.406 [INFO][4842] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.406 [INFO][4842] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.413 [WARNING][4842] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.413 [INFO][4842] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" HandleID="k8s-pod-network.7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" Workload="localhost-k8s-coredns--6f6b679f8f--hpvlr-eth0" May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.415 [INFO][4842] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:55.418916 env[1204]: 2025-05-13 00:39:55.417 [INFO][4834] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd" May 13 00:39:55.418916 env[1204]: time="2025-05-13T00:39:55.418840860Z" level=info msg="TearDown network for sandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\" successfully" May 13 00:39:55.423776 env[1204]: time="2025-05-13T00:39:55.423722634Z" level=info msg="RemovePodSandbox \"7418d19b8e301422e4c25c1d22168599c7d8d80dd2707d72c6cdde4ff788d2dd\" returns successfully" May 13 00:39:55.424359 env[1204]: time="2025-05-13T00:39:55.424310629Z" level=info msg="StopPodSandbox for \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\"" May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.466 [WARNING][4865] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0", GenerateName:"calico-kube-controllers-75c768cf7-", Namespace:"calico-system", SelfLink:"", UID:"ea02011d-117d-451e-84fb-5fdb7db708a7", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"75c768cf7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300", Pod:"calico-kube-controllers-75c768cf7-66sf4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calife7c5b25232", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.466 [INFO][4865] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.466 [INFO][4865] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" iface="eth0" netns="" May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.466 [INFO][4865] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.466 [INFO][4865] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.490 [INFO][4874] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.490 [INFO][4874] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.490 [INFO][4874] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.498 [WARNING][4874] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.498 [INFO][4874] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.500 [INFO][4874] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:55.503636 env[1204]: 2025-05-13 00:39:55.501 [INFO][4865] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:55.504544 env[1204]: time="2025-05-13T00:39:55.503669135Z" level=info msg="TearDown network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\" successfully" May 13 00:39:55.504544 env[1204]: time="2025-05-13T00:39:55.503709110Z" level=info msg="StopPodSandbox for \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\" returns successfully" May 13 00:39:55.504544 env[1204]: time="2025-05-13T00:39:55.504323403Z" level=info msg="RemovePodSandbox for \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\"" May 13 00:39:55.504544 env[1204]: time="2025-05-13T00:39:55.504388164Z" level=info msg="Forcibly stopping sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\"" May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.546 [WARNING][4897] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0", GenerateName:"calico-kube-controllers-75c768cf7-", Namespace:"calico-system", SelfLink:"", UID:"ea02011d-117d-451e-84fb-5fdb7db708a7", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 39, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"75c768cf7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec4c76b05b1fbb33beea1b5460948cbcb1b6ff681eb8f1171130ba466e498300", Pod:"calico-kube-controllers-75c768cf7-66sf4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calife7c5b25232", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.546 [INFO][4897] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.546 [INFO][4897] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" iface="eth0" netns="" May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.546 [INFO][4897] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.546 [INFO][4897] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.573 [INFO][4905] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.573 [INFO][4905] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.573 [INFO][4905] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.580 [WARNING][4905] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.580 [INFO][4905] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" HandleID="k8s-pod-network.9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" Workload="localhost-k8s-calico--kube--controllers--75c768cf7--66sf4-eth0" May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.583 [INFO][4905] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:39:55.586823 env[1204]: 2025-05-13 00:39:55.585 [INFO][4897] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7" May 13 00:39:55.587556 env[1204]: time="2025-05-13T00:39:55.586848203Z" level=info msg="TearDown network for sandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\" successfully" May 13 00:39:55.591045 env[1204]: time="2025-05-13T00:39:55.590953800Z" level=info msg="RemovePodSandbox \"9178293f8c6b40acdcbd03af7c0e99080f618829e4d245dbe471e699408fcee7\" returns successfully" May 13 00:39:56.716452 systemd[1]: Started sshd@16-10.0.0.18:22-10.0.0.1:55034.service. May 13 00:39:56.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.18:22-10.0.0.1:55034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:56.717470 kernel: kauditd_printk_skb: 37 callbacks suppressed May 13 00:39:56.717524 kernel: audit: type=1130 audit(1747096796.715:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.18:22-10.0.0.1:55034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:56.761000 audit[4915]: USER_ACCT pid=4915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.762643 sshd[4915]: Accepted publickey for core from 10.0.0.1 port 55034 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:56.764395 sshd[4915]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:56.762000 audit[4915]: CRED_ACQ pid=4915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.767620 systemd-logind[1194]: New session 17 of user core. May 13 00:39:56.768391 systemd[1]: Started session-17.scope. May 13 00:39:56.770875 kernel: audit: type=1101 audit(1747096796.761:1433): pid=4915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.771006 kernel: audit: type=1103 audit(1747096796.762:1434): pid=4915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.763000 audit[4915]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd95d002d0 a2=3 a3=0 items=0 ppid=1 pid=4915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:56.777399 kernel: audit: type=1006 audit(1747096796.763:1435): pid=4915 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 13 00:39:56.777465 kernel: audit: type=1300 audit(1747096796.763:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd95d002d0 a2=3 a3=0 items=0 ppid=1 pid=4915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:56.777492 kernel: audit: type=1327 audit(1747096796.763:1435): proctitle=737368643A20636F7265205B707269765D May 13 00:39:56.763000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:56.771000 audit[4915]: USER_START pid=4915 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.789467 kernel: audit: type=1105 audit(1747096796.771:1436): pid=4915 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.789624 kernel: audit: type=1103 audit(1747096796.772:1437): pid=4917 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.772000 audit[4917]: CRED_ACQ pid=4917 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.906353 sshd[4915]: pam_unix(sshd:session): session closed for user core May 13 00:39:56.906000 audit[4915]: USER_END pid=4915 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.909422 systemd[1]: sshd@16-10.0.0.18:22-10.0.0.1:55034.service: Deactivated successfully. May 13 00:39:56.909964 systemd[1]: session-17.scope: Deactivated successfully. May 13 00:39:56.910478 systemd-logind[1194]: Session 17 logged out. Waiting for processes to exit. May 13 00:39:56.911602 systemd[1]: Started sshd@17-10.0.0.18:22-10.0.0.1:55036.service. May 13 00:39:56.912472 systemd-logind[1194]: Removed session 17. May 13 00:39:56.906000 audit[4915]: CRED_DISP pid=4915 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.917292 kernel: audit: type=1106 audit(1747096796.906:1438): pid=4915 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.917379 kernel: audit: type=1104 audit(1747096796.906:1439): pid=4915 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.18:22-10.0.0.1:55034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:56.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.18:22-10.0.0.1:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:56.951000 audit[4929]: USER_ACCT pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.952947 sshd[4929]: Accepted publickey for core from 10.0.0.1 port 55036 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:56.953000 audit[4929]: CRED_ACQ pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.953000 audit[4929]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5da0fb60 a2=3 a3=0 items=0 ppid=1 pid=4929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:56.953000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:56.954348 sshd[4929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:56.957885 systemd-logind[1194]: New session 18 of user core. May 13 00:39:56.958652 systemd[1]: Started session-18.scope. May 13 00:39:56.962000 audit[4929]: USER_START pid=4929 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:56.963000 audit[4931]: CRED_ACQ pid=4931 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:57.247519 sshd[4929]: pam_unix(sshd:session): session closed for user core May 13 00:39:57.248000 audit[4929]: USER_END pid=4929 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:57.248000 audit[4929]: CRED_DISP pid=4929 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:57.250591 systemd[1]: Started sshd@18-10.0.0.18:22-10.0.0.1:55050.service. May 13 00:39:57.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.18:22-10.0.0.1:55050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:57.252514 systemd[1]: sshd@17-10.0.0.18:22-10.0.0.1:55036.service: Deactivated successfully. May 13 00:39:57.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.18:22-10.0.0.1:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:57.253498 systemd[1]: session-18.scope: Deactivated successfully. May 13 00:39:57.254613 systemd-logind[1194]: Session 18 logged out. Waiting for processes to exit. May 13 00:39:57.255655 systemd-logind[1194]: Removed session 18. May 13 00:39:57.296000 audit[4940]: USER_ACCT pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:57.297472 sshd[4940]: Accepted publickey for core from 10.0.0.1 port 55050 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:57.297000 audit[4940]: CRED_ACQ pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:57.297000 audit[4940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc709af440 a2=3 a3=0 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:57.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:57.298980 sshd[4940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:57.303866 systemd-logind[1194]: New session 19 of user core. May 13 00:39:57.304998 systemd[1]: Started session-19.scope. May 13 00:39:57.310000 audit[4940]: USER_START pid=4940 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:57.311000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.443000 audit[4959]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:59.443000 audit[4959]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd90bd1650 a2=0 a3=7ffd90bd163c items=0 ppid=2074 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:59.448000 audit[4959]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:59.448000 audit[4959]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd90bd1650 a2=0 a3=7ffd90bd163c items=0 ppid=2074 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:59.461981 sshd[4940]: pam_unix(sshd:session): session closed for user core May 13 00:39:59.462000 audit[4940]: USER_END pid=4940 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.462000 audit[4940]: CRED_DISP pid=4940 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.465530 systemd[1]: sshd@18-10.0.0.18:22-10.0.0.1:55050.service: Deactivated successfully. May 13 00:39:59.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.18:22-10.0.0.1:55050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:59.466506 systemd[1]: session-19.scope: Deactivated successfully. May 13 00:39:59.465000 audit[4962]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:59.465000 audit[4962]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffec031bbd0 a2=0 a3=7ffec031bbbc items=0 ppid=2074 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:59.467730 systemd-logind[1194]: Session 19 logged out. Waiting for processes to exit. May 13 00:39:59.469509 systemd[1]: Started sshd@19-10.0.0.18:22-10.0.0.1:55056.service. May 13 00:39:59.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.18:22-10.0.0.1:55056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:59.470966 systemd-logind[1194]: Removed session 19. May 13 00:39:59.471000 audit[4962]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:39:59.471000 audit[4962]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffec031bbd0 a2=0 a3=0 items=0 ppid=2074 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:39:59.520000 audit[4964]: USER_ACCT pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.521851 sshd[4964]: Accepted publickey for core from 10.0.0.1 port 55056 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:59.522000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.522000 audit[4964]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc03c2a140 a2=3 a3=0 items=0 ppid=1 pid=4964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.522000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:59.523614 sshd[4964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:59.528838 systemd-logind[1194]: New session 20 of user core. May 13 00:39:59.529614 systemd[1]: Started session-20.scope. May 13 00:39:59.535000 audit[4964]: USER_START pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.537000 audit[4966]: CRED_ACQ pid=4966 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.931671 sshd[4964]: pam_unix(sshd:session): session closed for user core May 13 00:39:59.932000 audit[4964]: USER_END pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.932000 audit[4964]: CRED_DISP pid=4964 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.936215 systemd[1]: sshd@19-10.0.0.18:22-10.0.0.1:55056.service: Deactivated successfully. May 13 00:39:59.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.18:22-10.0.0.1:55056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:59.937070 systemd[1]: session-20.scope: Deactivated successfully. May 13 00:39:59.940123 systemd[1]: Started sshd@20-10.0.0.18:22-10.0.0.1:55072.service. May 13 00:39:59.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.18:22-10.0.0.1:55072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:39:59.940757 systemd-logind[1194]: Session 20 logged out. Waiting for processes to exit. May 13 00:39:59.942758 systemd-logind[1194]: Removed session 20. May 13 00:39:59.990000 audit[4978]: USER_ACCT pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.991665 sshd[4978]: Accepted publickey for core from 10.0.0.1 port 55072 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:39:59.991000 audit[4978]: CRED_ACQ pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:39:59.991000 audit[4978]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa27c3eb0 a2=3 a3=0 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:39:59.991000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:39:59.993148 sshd[4978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:39:59.998437 systemd-logind[1194]: New session 21 of user core. May 13 00:39:59.999713 systemd[1]: Started session-21.scope. May 13 00:40:00.007000 audit[4978]: USER_START pid=4978 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:00.008000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:00.165060 sshd[4978]: pam_unix(sshd:session): session closed for user core May 13 00:40:00.165000 audit[4978]: USER_END pid=4978 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:00.165000 audit[4978]: CRED_DISP pid=4978 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:00.168745 systemd[1]: sshd@20-10.0.0.18:22-10.0.0.1:55072.service: Deactivated successfully. May 13 00:40:00.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.18:22-10.0.0.1:55072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:00.169784 systemd[1]: session-21.scope: Deactivated successfully. May 13 00:40:00.170600 systemd-logind[1194]: Session 21 logged out. Waiting for processes to exit. May 13 00:40:00.172616 systemd-logind[1194]: Removed session 21. May 13 00:40:05.170984 systemd[1]: Started sshd@21-10.0.0.18:22-10.0.0.1:55082.service. May 13 00:40:05.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.18:22-10.0.0.1:55082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:05.172199 kernel: kauditd_printk_skb: 57 callbacks suppressed May 13 00:40:05.172250 kernel: audit: type=1130 audit(1747096805.170:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.18:22-10.0.0.1:55082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:05.214000 audit[5012]: USER_ACCT pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.215308 sshd[5012]: Accepted publickey for core from 10.0.0.1 port 55082 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:40:05.217478 sshd[5012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:05.216000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.221739 systemd-logind[1194]: New session 22 of user core. May 13 00:40:05.222692 kernel: audit: type=1101 audit(1747096805.214:1482): pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.222753 kernel: audit: type=1103 audit(1747096805.216:1483): pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.222782 kernel: audit: type=1006 audit(1747096805.216:1484): pid=5012 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 13 00:40:05.222876 systemd[1]: Started session-22.scope. May 13 00:40:05.216000 audit[5012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7b43f080 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.229137 kernel: audit: type=1300 audit(1747096805.216:1484): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7b43f080 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.229172 kernel: audit: type=1327 audit(1747096805.216:1484): proctitle=737368643A20636F7265205B707269765D May 13 00:40:05.216000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:05.227000 audit[5012]: USER_START pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.234967 kernel: audit: type=1105 audit(1747096805.227:1485): pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.235083 kernel: audit: type=1103 audit(1747096805.228:1486): pid=5014 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.228000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.328779 sshd[5012]: pam_unix(sshd:session): session closed for user core May 13 00:40:05.328000 audit[5012]: USER_END pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.331156 systemd[1]: sshd@21-10.0.0.18:22-10.0.0.1:55082.service: Deactivated successfully. May 13 00:40:05.331890 systemd[1]: session-22.scope: Deactivated successfully. May 13 00:40:05.332579 systemd-logind[1194]: Session 22 logged out. Waiting for processes to exit. May 13 00:40:05.333425 systemd-logind[1194]: Removed session 22. May 13 00:40:05.328000 audit[5012]: CRED_DISP pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.337662 kernel: audit: type=1106 audit(1747096805.328:1487): pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.337834 kernel: audit: type=1104 audit(1747096805.328:1488): pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:05.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.18:22-10.0.0.1:55082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:05.829000 audit[5025]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:05.829000 audit[5025]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdf2894760 a2=0 a3=7ffdf289474c items=0 ppid=2074 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:05.836000 audit[5025]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=5025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:05.836000 audit[5025]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdf2894760 a2=0 a3=7ffdf289474c items=0 ppid=2074 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:05.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:10.336045 systemd[1]: Started sshd@22-10.0.0.18:22-10.0.0.1:38082.service. May 13 00:40:10.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.18:22-10.0.0.1:38082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:10.338616 kernel: kauditd_printk_skb: 7 callbacks suppressed May 13 00:40:10.338796 kernel: audit: type=1130 audit(1747096810.335:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.18:22-10.0.0.1:38082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:10.383000 audit[5029]: USER_ACCT pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.384558 sshd[5029]: Accepted publickey for core from 10.0.0.1 port 38082 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:40:10.387000 audit[5029]: CRED_ACQ pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.389277 sshd[5029]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:10.392879 kernel: audit: type=1101 audit(1747096810.383:1493): pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.393039 kernel: audit: type=1103 audit(1747096810.387:1494): pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.393068 kernel: audit: type=1006 audit(1747096810.388:1495): pid=5029 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 13 00:40:10.388000 audit[5029]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9450aeb0 a2=3 a3=0 items=0 ppid=1 pid=5029 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.395733 systemd-logind[1194]: New session 23 of user core. May 13 00:40:10.396799 systemd[1]: Started session-23.scope. May 13 00:40:10.400205 kernel: audit: type=1300 audit(1747096810.388:1495): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9450aeb0 a2=3 a3=0 items=0 ppid=1 pid=5029 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:10.400340 kernel: audit: type=1327 audit(1747096810.388:1495): proctitle=737368643A20636F7265205B707269765D May 13 00:40:10.388000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:10.401000 audit[5029]: USER_START pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.403000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.411166 kernel: audit: type=1105 audit(1747096810.401:1496): pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.411330 kernel: audit: type=1103 audit(1747096810.403:1497): pid=5031 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.521593 sshd[5029]: pam_unix(sshd:session): session closed for user core May 13 00:40:10.520000 audit[5029]: USER_END pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.524061 systemd[1]: sshd@22-10.0.0.18:22-10.0.0.1:38082.service: Deactivated successfully. May 13 00:40:10.525075 systemd[1]: session-23.scope: Deactivated successfully. May 13 00:40:10.525960 systemd-logind[1194]: Session 23 logged out. Waiting for processes to exit. May 13 00:40:10.520000 audit[5029]: CRED_DISP pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.526919 systemd-logind[1194]: Removed session 23. May 13 00:40:10.530396 kernel: audit: type=1106 audit(1747096810.520:1498): pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.530547 kernel: audit: type=1104 audit(1747096810.520:1499): pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:10.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.18:22-10.0.0.1:38082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:11.485592 kubelet[1946]: E0513 00:40:11.485540 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:15.486518 kubelet[1946]: E0513 00:40:15.486481 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:15.525201 systemd[1]: Started sshd@23-10.0.0.18:22-10.0.0.1:38090.service. May 13 00:40:15.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.18:22-10.0.0.1:38090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:15.548040 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:40:15.548097 kernel: audit: type=1130 audit(1747096815.524:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.18:22-10.0.0.1:38090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:15.588000 audit[5048]: USER_ACCT pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.589372 sshd[5048]: Accepted publickey for core from 10.0.0.1 port 38090 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:40:15.592000 audit[5048]: CRED_ACQ pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.593537 sshd[5048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:15.598313 kernel: audit: type=1101 audit(1747096815.588:1502): pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.598380 kernel: audit: type=1103 audit(1747096815.592:1503): pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.598413 kernel: audit: type=1006 audit(1747096815.592:1504): pid=5048 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 13 00:40:15.599104 systemd-logind[1194]: New session 24 of user core. May 13 00:40:15.599696 systemd[1]: Started session-24.scope. May 13 00:40:15.603815 kernel: audit: type=1300 audit(1747096815.592:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce9f366e0 a2=3 a3=0 items=0 ppid=1 pid=5048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.592000 audit[5048]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce9f366e0 a2=3 a3=0 items=0 ppid=1 pid=5048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:15.605977 kernel: audit: type=1327 audit(1747096815.592:1504): proctitle=737368643A20636F7265205B707269765D May 13 00:40:15.592000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:15.603000 audit[5048]: USER_START pid=5048 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.611637 kernel: audit: type=1105 audit(1747096815.603:1505): pid=5048 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.611696 kernel: audit: type=1103 audit(1747096815.605:1506): pid=5050 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.605000 audit[5050]: CRED_ACQ pid=5050 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.723791 sshd[5048]: pam_unix(sshd:session): session closed for user core May 13 00:40:15.723000 audit[5048]: USER_END pid=5048 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.726118 systemd[1]: sshd@23-10.0.0.18:22-10.0.0.1:38090.service: Deactivated successfully. May 13 00:40:15.726821 systemd[1]: session-24.scope: Deactivated successfully. May 13 00:40:15.727431 systemd-logind[1194]: Session 24 logged out. Waiting for processes to exit. May 13 00:40:15.728290 systemd-logind[1194]: Removed session 24. May 13 00:40:15.723000 audit[5048]: CRED_DISP pid=5048 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.732531 kernel: audit: type=1106 audit(1747096815.723:1507): pid=5048 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.732592 kernel: audit: type=1104 audit(1747096815.723:1508): pid=5048 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:15.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.18:22-10.0.0.1:38090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:16.486073 kubelet[1946]: E0513 00:40:16.486037 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:17.087785 kubelet[1946]: I0513 00:40:17.087745 1946 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:40:17.117000 audit[5063]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5063 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:17.117000 audit[5063]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdebcc8c30 a2=0 a3=7ffdebcc8c1c items=0 ppid=2074 pid=5063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:17.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:17.127000 audit[5063]: NETFILTER_CFG table=nat:126 family=2 entries=58 op=nft_register_chain pid=5063 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:40:17.127000 audit[5063]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffdebcc8c30 a2=0 a3=7ffdebcc8c1c items=0 ppid=2074 pid=5063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:17.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:40:17.485949 kubelet[1946]: E0513 00:40:17.485811 1946 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:40:20.734935 kernel: kauditd_printk_skb: 7 callbacks suppressed May 13 00:40:20.735056 kernel: audit: type=1130 audit(1747096820.728:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.18:22-10.0.0.1:52854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:20.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.18:22-10.0.0.1:52854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:40:20.728812 systemd[1]: Started sshd@24-10.0.0.18:22-10.0.0.1:52854.service. May 13 00:40:20.767000 audit[5065]: USER_ACCT pid=5065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.768453 sshd[5065]: Accepted publickey for core from 10.0.0.1 port 52854 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:40:20.769473 sshd[5065]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:40:20.768000 audit[5065]: CRED_ACQ pid=5065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.772718 systemd-logind[1194]: New session 25 of user core. May 13 00:40:20.773420 systemd[1]: Started session-25.scope. May 13 00:40:20.775859 kernel: audit: type=1101 audit(1747096820.767:1513): pid=5065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.775922 kernel: audit: type=1103 audit(1747096820.768:1514): pid=5065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.775943 kernel: audit: type=1006 audit(1747096820.768:1515): pid=5065 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 13 00:40:20.768000 audit[5065]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7d1baca0 a2=3 a3=0 items=0 ppid=1 pid=5065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:20.782181 kernel: audit: type=1300 audit(1747096820.768:1515): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7d1baca0 a2=3 a3=0 items=0 ppid=1 pid=5065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:40:20.782234 kernel: audit: type=1327 audit(1747096820.768:1515): proctitle=737368643A20636F7265205B707269765D May 13 00:40:20.768000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:40:20.776000 audit[5065]: USER_START pid=5065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.787749 kernel: audit: type=1105 audit(1747096820.776:1516): pid=5065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.787775 kernel: audit: type=1103 audit(1747096820.777:1517): pid=5067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.777000 audit[5067]: CRED_ACQ pid=5067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.880088 sshd[5065]: pam_unix(sshd:session): session closed for user core May 13 00:40:20.880000 audit[5065]: USER_END pid=5065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.882853 systemd[1]: sshd@24-10.0.0.18:22-10.0.0.1:52854.service: Deactivated successfully. May 13 00:40:20.883581 systemd[1]: session-25.scope: Deactivated successfully. May 13 00:40:20.884509 systemd-logind[1194]: Session 25 logged out. Waiting for processes to exit. May 13 00:40:20.885362 systemd-logind[1194]: Removed session 25. May 13 00:40:20.880000 audit[5065]: CRED_DISP pid=5065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.889091 kernel: audit: type=1106 audit(1747096820.880:1518): pid=5065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.889140 kernel: audit: type=1104 audit(1747096820.880:1519): pid=5065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:40:20.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.18:22-10.0.0.1:52854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'