May 13 00:44:27.871175 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 00:44:27.871201 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:44:27.871212 kernel: BIOS-provided physical RAM map: May 13 00:44:27.871219 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 13 00:44:27.871226 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 13 00:44:27.871234 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 13 00:44:27.871243 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 13 00:44:27.871250 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 13 00:44:27.871260 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:44:27.871267 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 13 00:44:27.871274 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 13 00:44:27.871282 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 13 00:44:27.871289 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 13 00:44:27.871296 kernel: NX (Execute Disable) protection: active May 13 00:44:27.871308 kernel: SMBIOS 2.8 present. May 13 00:44:27.871316 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 13 00:44:27.871324 kernel: Hypervisor detected: KVM May 13 00:44:27.871332 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 00:44:27.871339 kernel: kvm-clock: cpu 0, msr 49196001, primary cpu clock May 13 00:44:27.871347 kernel: kvm-clock: using sched offset of 2651029345 cycles May 13 00:44:27.871356 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 00:44:27.871364 kernel: tsc: Detected 2794.746 MHz processor May 13 00:44:27.871387 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 00:44:27.871398 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 00:44:27.871406 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 13 00:44:27.871415 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 00:44:27.871423 kernel: Using GB pages for direct mapping May 13 00:44:27.871431 kernel: ACPI: Early table checksum verification disabled May 13 00:44:27.871439 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 13 00:44:27.871447 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:44:27.871456 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:44:27.871464 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:44:27.871474 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 13 00:44:27.871483 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:44:27.871491 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:44:27.871499 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:44:27.871508 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:44:27.871516 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 13 00:44:27.871524 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 13 00:44:27.871533 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 13 00:44:27.871546 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 13 00:44:27.871555 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 13 00:44:27.871564 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 13 00:44:27.871573 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 13 00:44:27.871582 kernel: No NUMA configuration found May 13 00:44:27.871591 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 13 00:44:27.871613 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 13 00:44:27.871622 kernel: Zone ranges: May 13 00:44:27.871631 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 00:44:27.871639 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 13 00:44:27.871648 kernel: Normal empty May 13 00:44:27.871657 kernel: Movable zone start for each node May 13 00:44:27.871665 kernel: Early memory node ranges May 13 00:44:27.871674 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 13 00:44:27.871683 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 13 00:44:27.871692 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 13 00:44:27.871703 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:44:27.871712 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 13 00:44:27.871720 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 13 00:44:27.871729 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 00:44:27.871738 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 00:44:27.871747 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 00:44:27.871756 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 00:44:27.871765 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 00:44:27.871774 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 00:44:27.871784 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 00:44:27.871793 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 00:44:27.871802 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 00:44:27.871811 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 13 00:44:27.871820 kernel: TSC deadline timer available May 13 00:44:27.871828 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 13 00:44:27.871837 kernel: kvm-guest: KVM setup pv remote TLB flush May 13 00:44:27.871846 kernel: kvm-guest: setup PV sched yield May 13 00:44:27.871854 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 13 00:44:27.871865 kernel: Booting paravirtualized kernel on KVM May 13 00:44:27.871874 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 00:44:27.871883 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 13 00:44:27.871892 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 13 00:44:27.871901 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 13 00:44:27.871909 kernel: pcpu-alloc: [0] 0 1 2 3 May 13 00:44:27.871918 kernel: kvm-guest: setup async PF for cpu 0 May 13 00:44:27.871927 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 13 00:44:27.871935 kernel: kvm-guest: PV spinlocks enabled May 13 00:44:27.871947 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 13 00:44:27.871956 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 13 00:44:27.871965 kernel: Policy zone: DMA32 May 13 00:44:27.871975 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:44:27.871985 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:44:27.871994 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:44:27.872003 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:44:27.872012 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:44:27.872023 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 134796K reserved, 0K cma-reserved) May 13 00:44:27.872032 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:44:27.872041 kernel: ftrace: allocating 34584 entries in 136 pages May 13 00:44:27.872050 kernel: ftrace: allocated 136 pages with 2 groups May 13 00:44:27.872059 kernel: rcu: Hierarchical RCU implementation. May 13 00:44:27.872068 kernel: rcu: RCU event tracing is enabled. May 13 00:44:27.872077 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:44:27.872086 kernel: Rude variant of Tasks RCU enabled. May 13 00:44:27.872095 kernel: Tracing variant of Tasks RCU enabled. May 13 00:44:27.872107 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:44:27.872116 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:44:27.872125 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 13 00:44:27.872134 kernel: random: crng init done May 13 00:44:27.872142 kernel: Console: colour VGA+ 80x25 May 13 00:44:27.872151 kernel: printk: console [ttyS0] enabled May 13 00:44:27.872160 kernel: ACPI: Core revision 20210730 May 13 00:44:27.872169 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 13 00:44:27.872177 kernel: APIC: Switch to symmetric I/O mode setup May 13 00:44:27.872188 kernel: x2apic enabled May 13 00:44:27.872197 kernel: Switched APIC routing to physical x2apic. May 13 00:44:27.872205 kernel: kvm-guest: setup PV IPIs May 13 00:44:27.872214 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 00:44:27.872223 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 00:44:27.872232 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794746) May 13 00:44:27.872241 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 13 00:44:27.872250 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 13 00:44:27.872259 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 13 00:44:27.872277 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 00:44:27.872286 kernel: Spectre V2 : Mitigation: Retpolines May 13 00:44:27.872295 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 00:44:27.872306 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 13 00:44:27.872316 kernel: RETBleed: Mitigation: untrained return thunk May 13 00:44:27.872325 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 13 00:44:27.872335 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 13 00:44:27.872344 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 13 00:44:27.872353 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 13 00:44:27.872376 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 13 00:44:27.872386 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 13 00:44:27.872395 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 13 00:44:27.872405 kernel: Freeing SMP alternatives memory: 32K May 13 00:44:27.872414 kernel: pid_max: default: 32768 minimum: 301 May 13 00:44:27.872423 kernel: LSM: Security Framework initializing May 13 00:44:27.872433 kernel: SELinux: Initializing. May 13 00:44:27.872442 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:44:27.872454 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:44:27.872463 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 13 00:44:27.872473 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 13 00:44:27.872482 kernel: ... version: 0 May 13 00:44:27.872491 kernel: ... bit width: 48 May 13 00:44:27.872500 kernel: ... generic registers: 6 May 13 00:44:27.872510 kernel: ... value mask: 0000ffffffffffff May 13 00:44:27.872519 kernel: ... max period: 00007fffffffffff May 13 00:44:27.872528 kernel: ... fixed-purpose events: 0 May 13 00:44:27.872540 kernel: ... event mask: 000000000000003f May 13 00:44:27.872549 kernel: signal: max sigframe size: 1776 May 13 00:44:27.872558 kernel: rcu: Hierarchical SRCU implementation. May 13 00:44:27.872567 kernel: smp: Bringing up secondary CPUs ... May 13 00:44:27.872576 kernel: x86: Booting SMP configuration: May 13 00:44:27.872585 kernel: .... node #0, CPUs: #1 May 13 00:44:27.872605 kernel: kvm-clock: cpu 1, msr 49196041, secondary cpu clock May 13 00:44:27.872614 kernel: kvm-guest: setup async PF for cpu 1 May 13 00:44:27.872624 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 13 00:44:27.872635 kernel: #2 May 13 00:44:27.872645 kernel: kvm-clock: cpu 2, msr 49196081, secondary cpu clock May 13 00:44:27.872654 kernel: kvm-guest: setup async PF for cpu 2 May 13 00:44:27.872663 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 13 00:44:27.872672 kernel: #3 May 13 00:44:27.872681 kernel: kvm-clock: cpu 3, msr 491960c1, secondary cpu clock May 13 00:44:27.872690 kernel: kvm-guest: setup async PF for cpu 3 May 13 00:44:27.872699 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 13 00:44:27.872708 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:44:27.872719 kernel: smpboot: Max logical packages: 1 May 13 00:44:27.872728 kernel: smpboot: Total of 4 processors activated (22357.96 BogoMIPS) May 13 00:44:27.872737 kernel: devtmpfs: initialized May 13 00:44:27.872746 kernel: x86/mm: Memory block size: 128MB May 13 00:44:27.872756 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:44:27.872765 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:44:27.872774 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:44:27.872783 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:44:27.872793 kernel: audit: initializing netlink subsys (disabled) May 13 00:44:27.872804 kernel: audit: type=2000 audit(1747097066.861:1): state=initialized audit_enabled=0 res=1 May 13 00:44:27.872813 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:44:27.872822 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 00:44:27.872832 kernel: cpuidle: using governor menu May 13 00:44:27.872841 kernel: ACPI: bus type PCI registered May 13 00:44:27.872851 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:44:27.872860 kernel: dca service started, version 1.12.1 May 13 00:44:27.872869 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 13 00:44:27.872879 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 13 00:44:27.872890 kernel: PCI: Using configuration type 1 for base access May 13 00:44:27.872899 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 00:44:27.872909 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:44:27.872918 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:44:27.872927 kernel: ACPI: Added _OSI(Module Device) May 13 00:44:27.872936 kernel: ACPI: Added _OSI(Processor Device) May 13 00:44:27.872946 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:44:27.872955 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:44:27.872964 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:44:27.872975 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:44:27.872985 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:44:27.872994 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:44:27.873003 kernel: ACPI: Interpreter enabled May 13 00:44:27.873013 kernel: ACPI: PM: (supports S0 S3 S5) May 13 00:44:27.873022 kernel: ACPI: Using IOAPIC for interrupt routing May 13 00:44:27.873031 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 00:44:27.873041 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 13 00:44:27.873050 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:44:27.873215 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:44:27.873319 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 13 00:44:27.873434 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 13 00:44:27.873448 kernel: PCI host bridge to bus 0000:00 May 13 00:44:27.873561 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 00:44:27.873665 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 00:44:27.873753 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 00:44:27.873841 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 13 00:44:27.873927 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 00:44:27.874012 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 13 00:44:27.874098 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:44:27.874210 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 13 00:44:27.874319 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 13 00:44:27.874441 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 13 00:44:27.874541 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 13 00:44:27.874649 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 13 00:44:27.874747 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 00:44:27.874863 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:44:27.874961 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 13 00:44:27.875064 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 13 00:44:27.875165 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 13 00:44:27.875271 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 13 00:44:27.875384 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 13 00:44:27.875485 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 13 00:44:27.875581 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 13 00:44:27.875704 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 13 00:44:27.875802 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 13 00:44:27.875906 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 13 00:44:27.876005 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 13 00:44:27.876102 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 13 00:44:27.876207 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 13 00:44:27.876304 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 13 00:44:27.876424 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 13 00:44:27.876524 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 13 00:44:27.876635 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 13 00:44:27.876739 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 13 00:44:27.876837 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 13 00:44:27.876851 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 00:44:27.876861 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 00:44:27.876870 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 00:44:27.876880 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 00:44:27.876892 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 13 00:44:27.876901 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 13 00:44:27.876910 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 13 00:44:27.876920 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 13 00:44:27.876929 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 13 00:44:27.876939 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 13 00:44:27.876948 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 13 00:44:27.876957 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 13 00:44:27.876966 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 13 00:44:27.876978 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 13 00:44:27.876987 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 13 00:44:27.876997 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 13 00:44:27.877006 kernel: iommu: Default domain type: Translated May 13 00:44:27.877015 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 00:44:27.877118 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 13 00:44:27.877216 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 00:44:27.877313 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 13 00:44:27.877326 kernel: vgaarb: loaded May 13 00:44:27.877340 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:44:27.877349 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:44:27.877359 kernel: PTP clock support registered May 13 00:44:27.877381 kernel: PCI: Using ACPI for IRQ routing May 13 00:44:27.877392 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 00:44:27.877401 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 13 00:44:27.877410 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 13 00:44:27.877420 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 13 00:44:27.877429 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 13 00:44:27.877442 kernel: clocksource: Switched to clocksource kvm-clock May 13 00:44:27.877451 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:44:27.877461 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:44:27.877470 kernel: pnp: PnP ACPI init May 13 00:44:27.877577 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 13 00:44:27.877592 kernel: pnp: PnP ACPI: found 6 devices May 13 00:44:27.877612 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 00:44:27.877621 kernel: NET: Registered PF_INET protocol family May 13 00:44:27.877633 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:44:27.877643 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:44:27.877652 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:44:27.877662 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:44:27.877671 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:44:27.877681 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:44:27.877690 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:44:27.877700 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:44:27.877711 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:44:27.877721 kernel: NET: Registered PF_XDP protocol family May 13 00:44:27.877811 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 00:44:27.877899 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 00:44:27.877983 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 00:44:27.878069 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 13 00:44:27.878156 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 13 00:44:27.878241 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 13 00:44:27.878255 kernel: PCI: CLS 0 bytes, default 64 May 13 00:44:27.878267 kernel: Initialise system trusted keyrings May 13 00:44:27.878277 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:44:27.878287 kernel: Key type asymmetric registered May 13 00:44:27.878296 kernel: Asymmetric key parser 'x509' registered May 13 00:44:27.878305 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:44:27.878315 kernel: io scheduler mq-deadline registered May 13 00:44:27.878324 kernel: io scheduler kyber registered May 13 00:44:27.878334 kernel: io scheduler bfq registered May 13 00:44:27.878343 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 00:44:27.878355 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 13 00:44:27.883873 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 13 00:44:27.883896 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 13 00:44:27.883906 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:44:27.883916 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 00:44:27.883925 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 00:44:27.883935 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 00:44:27.883944 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 00:44:27.884059 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 00:44:27.884133 kernel: rtc_cmos 00:04: registered as rtc0 May 13 00:44:27.884143 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 00:44:27.884204 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T00:44:27 UTC (1747097067) May 13 00:44:27.884266 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 13 00:44:27.884275 kernel: NET: Registered PF_INET6 protocol family May 13 00:44:27.884282 kernel: Segment Routing with IPv6 May 13 00:44:27.884290 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:44:27.884296 kernel: NET: Registered PF_PACKET protocol family May 13 00:44:27.884305 kernel: Key type dns_resolver registered May 13 00:44:27.884312 kernel: IPI shorthand broadcast: enabled May 13 00:44:27.884320 kernel: sched_clock: Marking stable (439168755, 105460975)->(595566708, -50936978) May 13 00:44:27.884327 kernel: registered taskstats version 1 May 13 00:44:27.884334 kernel: Loading compiled-in X.509 certificates May 13 00:44:27.884341 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 00:44:27.884348 kernel: Key type .fscrypt registered May 13 00:44:27.884355 kernel: Key type fscrypt-provisioning registered May 13 00:44:27.884362 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:44:27.884385 kernel: ima: Allocated hash algorithm: sha1 May 13 00:44:27.884392 kernel: ima: No architecture policies found May 13 00:44:27.884399 kernel: clk: Disabling unused clocks May 13 00:44:27.884406 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 00:44:27.884413 kernel: Write protecting the kernel read-only data: 28672k May 13 00:44:27.884420 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 00:44:27.884427 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 00:44:27.884435 kernel: Run /init as init process May 13 00:44:27.884442 kernel: with arguments: May 13 00:44:27.884450 kernel: /init May 13 00:44:27.884457 kernel: with environment: May 13 00:44:27.884464 kernel: HOME=/ May 13 00:44:27.884471 kernel: TERM=linux May 13 00:44:27.884478 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:44:27.884488 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:44:27.884498 systemd[1]: Detected virtualization kvm. May 13 00:44:27.884506 systemd[1]: Detected architecture x86-64. May 13 00:44:27.884515 systemd[1]: Running in initrd. May 13 00:44:27.884522 systemd[1]: No hostname configured, using default hostname. May 13 00:44:27.884529 systemd[1]: Hostname set to . May 13 00:44:27.884537 systemd[1]: Initializing machine ID from VM UUID. May 13 00:44:27.884545 systemd[1]: Queued start job for default target initrd.target. May 13 00:44:27.884552 systemd[1]: Started systemd-ask-password-console.path. May 13 00:44:27.884559 systemd[1]: Reached target cryptsetup.target. May 13 00:44:27.884567 systemd[1]: Reached target paths.target. May 13 00:44:27.884576 systemd[1]: Reached target slices.target. May 13 00:44:27.884590 systemd[1]: Reached target swap.target. May 13 00:44:27.884610 systemd[1]: Reached target timers.target. May 13 00:44:27.884618 systemd[1]: Listening on iscsid.socket. May 13 00:44:27.884626 systemd[1]: Listening on iscsiuio.socket. May 13 00:44:27.884638 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:44:27.884648 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:44:27.884659 systemd[1]: Listening on systemd-journald.socket. May 13 00:44:27.884669 systemd[1]: Listening on systemd-networkd.socket. May 13 00:44:27.884680 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:44:27.884690 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:44:27.884700 systemd[1]: Reached target sockets.target. May 13 00:44:27.884711 systemd[1]: Starting kmod-static-nodes.service... May 13 00:44:27.884722 systemd[1]: Finished network-cleanup.service. May 13 00:44:27.884735 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:44:27.884745 systemd[1]: Starting systemd-journald.service... May 13 00:44:27.884755 systemd[1]: Starting systemd-modules-load.service... May 13 00:44:27.884766 systemd[1]: Starting systemd-resolved.service... May 13 00:44:27.884776 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:44:27.884786 systemd[1]: Finished kmod-static-nodes.service. May 13 00:44:27.884797 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:44:27.884807 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:44:27.884822 systemd-journald[198]: Journal started May 13 00:44:27.884881 systemd-journald[198]: Runtime Journal (/run/log/journal/8e981de2def842e38c237bb130c0471c) is 6.0M, max 48.5M, 42.5M free. May 13 00:44:27.865107 systemd-modules-load[199]: Inserted module 'overlay' May 13 00:44:27.912907 systemd[1]: Started systemd-journald.service. May 13 00:44:27.912928 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:44:27.912940 kernel: Bridge firewalling registered May 13 00:44:27.912950 kernel: audit: type=1130 audit(1747097067.907:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.912959 kernel: audit: type=1130 audit(1747097067.912:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.897729 systemd-resolved[200]: Positive Trust Anchors: May 13 00:44:27.897737 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:44:27.897765 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:44:27.898024 systemd-modules-load[199]: Inserted module 'br_netfilter' May 13 00:44:27.929303 kernel: SCSI subsystem initialized May 13 00:44:27.899928 systemd-resolved[200]: Defaulting to hostname 'linux'. May 13 00:44:27.908333 systemd[1]: Started systemd-resolved.service. May 13 00:44:27.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.913007 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:44:27.917702 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:44:27.918151 systemd[1]: Reached target nss-lookup.target. May 13 00:44:27.926993 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:44:27.937762 kernel: audit: type=1130 audit(1747097067.917:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.941389 kernel: audit: type=1130 audit(1747097067.917:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.943918 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:44:27.943931 kernel: device-mapper: uevent: version 1.0.3 May 13 00:44:27.945217 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:44:27.948020 systemd-modules-load[199]: Inserted module 'dm_multipath' May 13 00:44:27.949383 systemd[1]: Finished systemd-modules-load.service. May 13 00:44:27.954505 kernel: audit: type=1130 audit(1747097067.950:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.954474 systemd[1]: Starting systemd-sysctl.service... May 13 00:44:27.956843 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:44:27.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.959747 systemd[1]: Starting dracut-cmdline.service... May 13 00:44:27.964457 kernel: audit: type=1130 audit(1747097067.958:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.963457 systemd[1]: Finished systemd-sysctl.service. May 13 00:44:27.968875 kernel: audit: type=1130 audit(1747097067.964:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:27.973586 dracut-cmdline[220]: dracut-dracut-053 May 13 00:44:27.976156 dracut-cmdline[220]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:44:28.027393 kernel: Loading iSCSI transport class v2.0-870. May 13 00:44:28.043394 kernel: iscsi: registered transport (tcp) May 13 00:44:28.064386 kernel: iscsi: registered transport (qla4xxx) May 13 00:44:28.064418 kernel: QLogic iSCSI HBA Driver May 13 00:44:28.088802 systemd[1]: Finished dracut-cmdline.service. May 13 00:44:28.094113 kernel: audit: type=1130 audit(1747097068.089:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:28.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:28.090543 systemd[1]: Starting dracut-pre-udev.service... May 13 00:44:28.136400 kernel: raid6: avx2x4 gen() 29849 MB/s May 13 00:44:28.153392 kernel: raid6: avx2x4 xor() 7291 MB/s May 13 00:44:28.170388 kernel: raid6: avx2x2 gen() 30659 MB/s May 13 00:44:28.187388 kernel: raid6: avx2x2 xor() 18561 MB/s May 13 00:44:28.204388 kernel: raid6: avx2x1 gen() 25809 MB/s May 13 00:44:28.221396 kernel: raid6: avx2x1 xor() 14749 MB/s May 13 00:44:28.238388 kernel: raid6: sse2x4 gen() 13690 MB/s May 13 00:44:28.255391 kernel: raid6: sse2x4 xor() 6741 MB/s May 13 00:44:28.272387 kernel: raid6: sse2x2 gen() 15416 MB/s May 13 00:44:28.289388 kernel: raid6: sse2x2 xor() 9385 MB/s May 13 00:44:28.306390 kernel: raid6: sse2x1 gen() 11598 MB/s May 13 00:44:28.323889 kernel: raid6: sse2x1 xor() 7370 MB/s May 13 00:44:28.323911 kernel: raid6: using algorithm avx2x2 gen() 30659 MB/s May 13 00:44:28.323921 kernel: raid6: .... xor() 18561 MB/s, rmw enabled May 13 00:44:28.324636 kernel: raid6: using avx2x2 recovery algorithm May 13 00:44:28.338439 kernel: xor: automatically using best checksumming function avx May 13 00:44:28.433415 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 00:44:28.444254 systemd[1]: Finished dracut-pre-udev.service. May 13 00:44:28.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:28.450882 kernel: audit: type=1130 audit(1747097068.445:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:28.450000 audit: BPF prog-id=7 op=LOAD May 13 00:44:28.450000 audit: BPF prog-id=8 op=LOAD May 13 00:44:28.452621 systemd[1]: Starting systemd-udevd.service... May 13 00:44:28.466937 systemd-udevd[399]: Using default interface naming scheme 'v252'. May 13 00:44:28.471230 systemd[1]: Started systemd-udevd.service. May 13 00:44:28.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:28.474919 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:44:28.486644 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation May 13 00:44:28.516395 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:44:28.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:28.519522 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:44:28.556300 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:44:28.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:28.586541 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:44:28.598566 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:44:28.598590 kernel: GPT:9289727 != 19775487 May 13 00:44:28.598599 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:44:28.598608 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:44:28.598619 kernel: GPT:9289727 != 19775487 May 13 00:44:28.598628 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:44:28.598636 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:44:28.600387 kernel: libata version 3.00 loaded. May 13 00:44:28.609704 kernel: AVX2 version of gcm_enc/dec engaged. May 13 00:44:28.609753 kernel: ahci 0000:00:1f.2: version 3.0 May 13 00:44:28.620572 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 13 00:44:28.620604 kernel: AES CTR mode by8 optimization enabled May 13 00:44:28.620615 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 13 00:44:28.620710 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 13 00:44:28.620788 kernel: scsi host0: ahci May 13 00:44:28.620880 kernel: scsi host1: ahci May 13 00:44:28.620967 kernel: scsi host2: ahci May 13 00:44:28.621052 kernel: scsi host3: ahci May 13 00:44:28.621153 kernel: scsi host4: ahci May 13 00:44:28.621235 kernel: scsi host5: ahci May 13 00:44:28.621331 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 13 00:44:28.621341 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 13 00:44:28.621352 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 13 00:44:28.621360 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 13 00:44:28.621383 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 13 00:44:28.621391 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 13 00:44:28.633391 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (447) May 13 00:44:28.637973 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:44:28.675835 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:44:28.678046 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:44:28.684306 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:44:28.690225 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:44:28.694025 systemd[1]: Starting disk-uuid.service... May 13 00:44:28.935234 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 13 00:44:28.935322 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 13 00:44:28.935332 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 13 00:44:28.935341 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 13 00:44:28.936395 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 13 00:44:28.939400 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 13 00:44:28.939416 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 13 00:44:28.939425 kernel: ata3.00: applying bridge limits May 13 00:44:28.940594 kernel: ata3.00: configured for UDMA/100 May 13 00:44:28.941386 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 13 00:44:28.973514 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 13 00:44:28.991044 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 13 00:44:28.991061 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 13 00:44:29.100395 disk-uuid[524]: Primary Header is updated. May 13 00:44:29.100395 disk-uuid[524]: Secondary Entries is updated. May 13 00:44:29.100395 disk-uuid[524]: Secondary Header is updated. May 13 00:44:29.104828 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:44:29.109402 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:44:30.121394 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:44:30.121650 disk-uuid[543]: The operation has completed successfully. May 13 00:44:30.145494 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:44:30.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.145613 systemd[1]: Finished disk-uuid.service. May 13 00:44:30.150768 systemd[1]: Starting verity-setup.service... May 13 00:44:30.176421 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 13 00:44:30.195133 systemd[1]: Found device dev-mapper-usr.device. May 13 00:44:30.197043 systemd[1]: Mounting sysusr-usr.mount... May 13 00:44:30.199151 systemd[1]: Finished verity-setup.service. May 13 00:44:30.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.256400 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:44:30.256711 systemd[1]: Mounted sysusr-usr.mount. May 13 00:44:30.257295 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:44:30.258051 systemd[1]: Starting ignition-setup.service... May 13 00:44:30.259263 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:44:30.270283 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:44:30.270337 kernel: BTRFS info (device vda6): using free space tree May 13 00:44:30.270356 kernel: BTRFS info (device vda6): has skinny extents May 13 00:44:30.279128 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:44:30.318994 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:44:30.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.320000 audit: BPF prog-id=9 op=LOAD May 13 00:44:30.321608 systemd[1]: Starting systemd-networkd.service... May 13 00:44:30.352298 systemd-networkd[713]: lo: Link UP May 13 00:44:30.352311 systemd-networkd[713]: lo: Gained carrier May 13 00:44:30.368593 systemd-networkd[713]: Enumeration completed May 13 00:44:30.368740 systemd[1]: Started systemd-networkd.service. May 13 00:44:30.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.369438 systemd[1]: Reached target network.target. May 13 00:44:30.372547 systemd[1]: Starting iscsiuio.service... May 13 00:44:30.374980 systemd-networkd[713]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:44:30.377941 systemd[1]: Started iscsiuio.service. May 13 00:44:30.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.379727 systemd[1]: Starting iscsid.service... May 13 00:44:30.381793 systemd-networkd[713]: eth0: Link UP May 13 00:44:30.381805 systemd-networkd[713]: eth0: Gained carrier May 13 00:44:30.383699 iscsid[718]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:44:30.383699 iscsid[718]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:44:30.383699 iscsid[718]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:44:30.383699 iscsid[718]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:44:30.383699 iscsid[718]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:44:30.383699 iscsid[718]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:44:30.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.383512 systemd[1]: Started iscsid.service. May 13 00:44:30.385173 systemd[1]: Starting dracut-initqueue.service... May 13 00:44:30.401907 systemd[1]: Finished dracut-initqueue.service. May 13 00:44:30.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.404221 systemd[1]: Reached target remote-fs-pre.target. May 13 00:44:30.404837 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:44:30.406393 systemd[1]: Reached target remote-fs.target. May 13 00:44:30.409244 systemd[1]: Starting dracut-pre-mount.service... May 13 00:44:30.440485 systemd-networkd[713]: eth0: DHCPv4 address 10.0.0.89/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:44:30.448983 systemd[1]: Finished dracut-pre-mount.service. May 13 00:44:30.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.544886 systemd[1]: Finished ignition-setup.service. May 13 00:44:30.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.546515 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:44:30.585735 ignition[733]: Ignition 2.14.0 May 13 00:44:30.585747 ignition[733]: Stage: fetch-offline May 13 00:44:30.585792 ignition[733]: no configs at "/usr/lib/ignition/base.d" May 13 00:44:30.585800 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:44:30.585897 ignition[733]: parsed url from cmdline: "" May 13 00:44:30.585901 ignition[733]: no config URL provided May 13 00:44:30.585905 ignition[733]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:44:30.585912 ignition[733]: no config at "/usr/lib/ignition/user.ign" May 13 00:44:30.585934 ignition[733]: op(1): [started] loading QEMU firmware config module May 13 00:44:30.585939 ignition[733]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:44:30.594905 ignition[733]: op(1): [finished] loading QEMU firmware config module May 13 00:44:30.633595 ignition[733]: parsing config with SHA512: a85ccc591d0385c98c47ef334ba0bbb3d99b83a4dd6f5ce524218db7e07a8c6d3953bd105136509ffeaf4322e74624a55fadf95d4177e96fdf2e670b9ae1227f May 13 00:44:30.640233 unknown[733]: fetched base config from "system" May 13 00:44:30.640247 unknown[733]: fetched user config from "qemu" May 13 00:44:30.640679 ignition[733]: fetch-offline: fetch-offline passed May 13 00:44:30.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.641957 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:44:30.640745 ignition[733]: Ignition finished successfully May 13 00:44:30.642363 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:44:30.643330 systemd[1]: Starting ignition-kargs.service... May 13 00:44:30.654128 ignition[741]: Ignition 2.14.0 May 13 00:44:30.654137 ignition[741]: Stage: kargs May 13 00:44:30.654282 ignition[741]: no configs at "/usr/lib/ignition/base.d" May 13 00:44:30.654293 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:44:30.655618 ignition[741]: kargs: kargs passed May 13 00:44:30.655661 ignition[741]: Ignition finished successfully May 13 00:44:30.660310 systemd[1]: Finished ignition-kargs.service. May 13 00:44:30.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.662894 systemd[1]: Starting ignition-disks.service... May 13 00:44:30.670580 ignition[747]: Ignition 2.14.0 May 13 00:44:30.670592 ignition[747]: Stage: disks May 13 00:44:30.670711 ignition[747]: no configs at "/usr/lib/ignition/base.d" May 13 00:44:30.670723 ignition[747]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:44:30.671896 ignition[747]: disks: disks passed May 13 00:44:30.671943 ignition[747]: Ignition finished successfully May 13 00:44:30.676236 systemd[1]: Finished ignition-disks.service. May 13 00:44:30.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.678172 systemd[1]: Reached target initrd-root-device.target. May 13 00:44:30.678652 systemd[1]: Reached target local-fs-pre.target. May 13 00:44:30.680739 systemd[1]: Reached target local-fs.target. May 13 00:44:30.682258 systemd[1]: Reached target sysinit.target. May 13 00:44:30.683969 systemd[1]: Reached target basic.target. May 13 00:44:30.686584 systemd[1]: Starting systemd-fsck-root.service... May 13 00:44:30.698173 systemd-fsck[755]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 13 00:44:30.996265 systemd[1]: Finished systemd-fsck-root.service. May 13 00:44:30.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:30.999150 systemd[1]: Mounting sysroot.mount... May 13 00:44:31.027411 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:44:31.027845 systemd[1]: Mounted sysroot.mount. May 13 00:44:31.028437 systemd[1]: Reached target initrd-root-fs.target. May 13 00:44:31.031008 systemd[1]: Mounting sysroot-usr.mount... May 13 00:44:31.031889 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:44:31.031921 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:44:31.031943 systemd[1]: Reached target ignition-diskful.target. May 13 00:44:31.051498 systemd[1]: Mounted sysroot-usr.mount. May 13 00:44:31.052994 systemd[1]: Starting initrd-setup-root.service... May 13 00:44:31.058811 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:44:31.063686 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory May 13 00:44:31.067687 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:44:31.070608 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:44:31.099752 systemd[1]: Finished initrd-setup-root.service. May 13 00:44:31.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:31.100806 systemd[1]: Starting ignition-mount.service... May 13 00:44:31.102931 systemd[1]: Starting sysroot-boot.service... May 13 00:44:31.106899 bash[806]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:44:31.115547 ignition[807]: INFO : Ignition 2.14.0 May 13 00:44:31.116521 ignition[807]: INFO : Stage: mount May 13 00:44:31.116521 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:44:31.116521 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:44:31.119427 ignition[807]: INFO : mount: mount passed May 13 00:44:31.119427 ignition[807]: INFO : Ignition finished successfully May 13 00:44:31.120457 systemd[1]: Finished ignition-mount.service. May 13 00:44:31.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:31.127981 systemd[1]: Finished sysroot-boot.service. May 13 00:44:31.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:31.206501 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:44:31.239727 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (817) May 13 00:44:31.239764 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:44:31.239774 kernel: BTRFS info (device vda6): using free space tree May 13 00:44:31.240746 kernel: BTRFS info (device vda6): has skinny extents May 13 00:44:31.245053 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:44:31.294507 systemd[1]: Starting ignition-files.service... May 13 00:44:31.310865 ignition[837]: INFO : Ignition 2.14.0 May 13 00:44:31.310865 ignition[837]: INFO : Stage: files May 13 00:44:31.312755 ignition[837]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:44:31.312755 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:44:31.312755 ignition[837]: DEBUG : files: compiled without relabeling support, skipping May 13 00:44:31.316473 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:44:31.316473 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:44:31.316473 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:44:31.316473 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:44:31.316473 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:44:31.316011 unknown[837]: wrote ssh authorized keys file for user: core May 13 00:44:31.324889 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 13 00:44:31.324889 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 13 00:44:31.364396 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 00:44:31.502026 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 13 00:44:31.502026 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 00:44:31.529439 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 13 00:44:31.926345 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 00:44:32.254577 systemd-networkd[713]: eth0: Gained IPv6LL May 13 00:44:32.392786 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 00:44:32.392786 ignition[837]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 13 00:44:32.397217 ignition[837]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:44:32.397217 ignition[837]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:44:32.397217 ignition[837]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 13 00:44:32.397217 ignition[837]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 13 00:44:32.397217 ignition[837]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:44:32.397217 ignition[837]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:44:32.397217 ignition[837]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 13 00:44:32.397217 ignition[837]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 00:44:32.417877 ignition[837]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 00:44:32.417877 ignition[837]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:44:32.417877 ignition[837]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:44:32.459696 ignition[837]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:44:32.459696 ignition[837]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:44:32.459696 ignition[837]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:44:32.459696 ignition[837]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:44:32.459696 ignition[837]: INFO : files: files passed May 13 00:44:32.459696 ignition[837]: INFO : Ignition finished successfully May 13 00:44:32.485573 kernel: kauditd_printk_skb: 23 callbacks suppressed May 13 00:44:32.485605 kernel: audit: type=1130 audit(1747097072.465:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.485621 kernel: audit: type=1130 audit(1747097072.473:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.485647 kernel: audit: type=1131 audit(1747097072.473:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.462036 systemd[1]: Finished ignition-files.service. May 13 00:44:32.466563 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:44:32.470018 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:44:32.470821 systemd[1]: Starting ignition-quench.service... May 13 00:44:32.473736 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:44:32.473819 systemd[1]: Finished ignition-quench.service. May 13 00:44:32.494261 initrd-setup-root-after-ignition[862]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:44:32.498150 initrd-setup-root-after-ignition[864]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:44:32.500897 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:44:32.507827 kernel: audit: type=1130 audit(1747097072.502:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.502174 systemd[1]: Reached target ignition-complete.target. May 13 00:44:32.508876 systemd[1]: Starting initrd-parse-etc.service... May 13 00:44:32.524503 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:44:32.524623 systemd[1]: Finished initrd-parse-etc.service. May 13 00:44:32.536797 kernel: audit: type=1130 audit(1747097072.526:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.536826 kernel: audit: type=1131 audit(1747097072.526:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.526757 systemd[1]: Reached target initrd-fs.target. May 13 00:44:32.536852 systemd[1]: Reached target initrd.target. May 13 00:44:32.537765 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:44:32.538577 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:44:32.549502 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:44:32.555693 kernel: audit: type=1130 audit(1747097072.550:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.551470 systemd[1]: Starting initrd-cleanup.service... May 13 00:44:32.560525 systemd[1]: Stopped target nss-lookup.target. May 13 00:44:32.561584 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:44:32.563383 systemd[1]: Stopped target timers.target. May 13 00:44:32.565151 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:44:32.571127 kernel: audit: type=1131 audit(1747097072.566:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.565296 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:44:32.567012 systemd[1]: Stopped target initrd.target. May 13 00:44:32.572206 systemd[1]: Stopped target basic.target. May 13 00:44:32.573849 systemd[1]: Stopped target ignition-complete.target. May 13 00:44:32.575562 systemd[1]: Stopped target ignition-diskful.target. May 13 00:44:32.577331 systemd[1]: Stopped target initrd-root-device.target. May 13 00:44:32.579121 systemd[1]: Stopped target remote-fs.target. May 13 00:44:32.580799 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:44:32.582635 systemd[1]: Stopped target sysinit.target. May 13 00:44:32.584224 systemd[1]: Stopped target local-fs.target. May 13 00:44:32.585987 systemd[1]: Stopped target local-fs-pre.target. May 13 00:44:32.587630 systemd[1]: Stopped target swap.target. May 13 00:44:32.595665 kernel: audit: type=1131 audit(1747097072.590:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.589134 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:44:32.589295 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:44:32.602728 kernel: audit: type=1131 audit(1747097072.597:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.591022 systemd[1]: Stopped target cryptsetup.target. May 13 00:44:32.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.595774 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:44:32.595910 systemd[1]: Stopped dracut-initqueue.service. May 13 00:44:32.597818 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:44:32.597940 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:44:32.603746 systemd[1]: Stopped target paths.target. May 13 00:44:32.605481 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:44:32.609551 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:44:32.611029 systemd[1]: Stopped target slices.target. May 13 00:44:32.612626 systemd[1]: Stopped target sockets.target. May 13 00:44:32.614182 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:44:32.614285 systemd[1]: Closed iscsid.socket. May 13 00:44:32.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.615608 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:44:32.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.615706 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:44:32.617509 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:44:32.617593 systemd[1]: Stopped ignition-files.service. May 13 00:44:32.619991 systemd[1]: Stopping ignition-mount.service... May 13 00:44:32.621094 systemd[1]: Stopping iscsiuio.service... May 13 00:44:32.625549 systemd[1]: Stopping sysroot-boot.service... May 13 00:44:32.628549 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:44:32.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.632923 ignition[877]: INFO : Ignition 2.14.0 May 13 00:44:32.632923 ignition[877]: INFO : Stage: umount May 13 00:44:32.632923 ignition[877]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:44:32.632923 ignition[877]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:44:32.632923 ignition[877]: INFO : umount: umount passed May 13 00:44:32.632923 ignition[877]: INFO : Ignition finished successfully May 13 00:44:32.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.628823 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:44:32.629381 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:44:32.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.629563 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:44:32.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.634030 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:44:32.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.634118 systemd[1]: Stopped iscsiuio.service. May 13 00:44:32.635440 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:44:32.635536 systemd[1]: Stopped ignition-mount.service. May 13 00:44:32.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.638783 systemd[1]: Stopped target network.target. May 13 00:44:32.639651 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:44:32.639681 systemd[1]: Closed iscsiuio.socket. May 13 00:44:32.641263 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:44:32.641299 systemd[1]: Stopped ignition-disks.service. May 13 00:44:32.642826 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:44:32.642860 systemd[1]: Stopped ignition-kargs.service. May 13 00:44:32.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.644690 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:44:32.644720 systemd[1]: Stopped ignition-setup.service. May 13 00:44:32.646678 systemd[1]: Stopping systemd-networkd.service... May 13 00:44:32.648404 systemd[1]: Stopping systemd-resolved.service... May 13 00:44:32.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.649947 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:44:32.650021 systemd[1]: Finished initrd-cleanup.service. May 13 00:44:32.657459 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:44:32.657593 systemd[1]: Stopped systemd-resolved.service. May 13 00:44:32.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.669000 audit: BPF prog-id=6 op=UNLOAD May 13 00:44:32.660441 systemd-networkd[713]: eth0: DHCPv6 lease lost May 13 00:44:32.671000 audit: BPF prog-id=9 op=UNLOAD May 13 00:44:32.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.662212 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:44:32.662314 systemd[1]: Stopped systemd-networkd.service. May 13 00:44:32.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.665577 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:44:32.665625 systemd[1]: Closed systemd-networkd.socket. May 13 00:44:32.667244 systemd[1]: Stopping network-cleanup.service... May 13 00:44:32.667995 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:44:32.668044 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:44:32.669939 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:44:32.669985 systemd[1]: Stopped systemd-sysctl.service. May 13 00:44:32.673134 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:44:32.673196 systemd[1]: Stopped systemd-modules-load.service. May 13 00:44:32.675122 systemd[1]: Stopping systemd-udevd.service... May 13 00:44:32.686347 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:44:32.689237 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:44:32.690342 systemd[1]: Stopped systemd-udevd.service. May 13 00:44:32.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.695059 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:44:32.697063 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:44:32.697107 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:44:32.700394 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:44:32.700577 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:44:32.703307 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:44:32.704336 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:44:32.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.706094 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:44:32.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.706131 systemd[1]: Stopped dracut-cmdline.service. May 13 00:44:32.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.708047 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:44:32.708083 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:44:32.710412 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:44:32.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.713924 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 13 00:44:32.714009 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 13 00:44:32.719872 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:44:32.719950 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:44:32.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.722994 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:44:32.723044 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:44:32.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.728261 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 13 00:44:32.728893 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:44:32.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.730045 systemd[1]: Stopped network-cleanup.service. May 13 00:44:32.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.732254 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:44:32.732350 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:44:32.769293 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:44:32.769404 systemd[1]: Stopped sysroot-boot.service. May 13 00:44:32.771658 systemd[1]: Reached target initrd-switch-root.target. May 13 00:44:32.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:32.773403 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:44:32.773445 systemd[1]: Stopped initrd-setup-root.service. May 13 00:44:32.774609 systemd[1]: Starting initrd-switch-root.service... May 13 00:44:32.792182 systemd[1]: Switching root. May 13 00:44:32.813229 iscsid[718]: iscsid shutting down. May 13 00:44:32.814154 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 13 00:44:32.814205 systemd-journald[198]: Journal stopped May 13 00:44:36.546796 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:44:36.546869 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:44:36.546902 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:44:36.546924 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:44:36.546938 kernel: SELinux: policy capability open_perms=1 May 13 00:44:36.546950 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:44:36.546970 kernel: SELinux: policy capability always_check_network=0 May 13 00:44:36.546989 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:44:36.547970 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:44:36.547994 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:44:36.548007 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:44:36.548024 systemd[1]: Successfully loaded SELinux policy in 47.585ms. May 13 00:44:36.548061 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.275ms. May 13 00:44:36.548077 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:44:36.548091 systemd[1]: Detected virtualization kvm. May 13 00:44:36.548105 systemd[1]: Detected architecture x86-64. May 13 00:44:36.548117 systemd[1]: Detected first boot. May 13 00:44:36.548131 systemd[1]: Initializing machine ID from VM UUID. May 13 00:44:36.548144 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:44:36.548162 systemd[1]: Populated /etc with preset unit settings. May 13 00:44:36.548176 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:44:36.548197 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:44:36.548352 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:44:36.548389 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:44:36.548411 systemd[1]: Stopped iscsid.service. May 13 00:44:36.548421 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:44:36.548431 systemd[1]: Stopped initrd-switch-root.service. May 13 00:44:36.548442 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:44:36.548452 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:44:36.548462 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:44:36.548485 systemd[1]: Created slice system-getty.slice. May 13 00:44:36.548501 systemd[1]: Created slice system-modprobe.slice. May 13 00:44:36.548513 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:44:36.548523 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:44:36.548534 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:44:36.548544 systemd[1]: Created slice user.slice. May 13 00:44:36.548554 systemd[1]: Started systemd-ask-password-console.path. May 13 00:44:36.548574 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:44:36.548701 systemd[1]: Set up automount boot.automount. May 13 00:44:36.548721 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:44:36.548738 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:44:36.548756 systemd[1]: Stopped target initrd-fs.target. May 13 00:44:36.548771 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:44:36.548785 systemd[1]: Reached target integritysetup.target. May 13 00:44:36.548799 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:44:36.548812 systemd[1]: Reached target remote-fs.target. May 13 00:44:36.548826 systemd[1]: Reached target slices.target. May 13 00:44:36.548839 systemd[1]: Reached target swap.target. May 13 00:44:36.548852 systemd[1]: Reached target torcx.target. May 13 00:44:36.548868 systemd[1]: Reached target veritysetup.target. May 13 00:44:36.548882 systemd[1]: Listening on systemd-coredump.socket. May 13 00:44:36.548897 systemd[1]: Listening on systemd-initctl.socket. May 13 00:44:36.548917 systemd[1]: Listening on systemd-networkd.socket. May 13 00:44:36.548938 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:44:36.548952 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:44:36.548962 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:44:36.548973 systemd[1]: Mounting dev-hugepages.mount... May 13 00:44:36.548985 systemd[1]: Mounting dev-mqueue.mount... May 13 00:44:36.549012 systemd[1]: Mounting media.mount... May 13 00:44:36.549024 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:36.549034 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:44:36.549046 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:44:36.549056 systemd[1]: Mounting tmp.mount... May 13 00:44:36.549066 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:44:36.549076 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:36.549086 systemd[1]: Starting kmod-static-nodes.service... May 13 00:44:36.549096 systemd[1]: Starting modprobe@configfs.service... May 13 00:44:36.549108 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:36.549118 systemd[1]: Starting modprobe@drm.service... May 13 00:44:36.549128 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:36.549138 systemd[1]: Starting modprobe@fuse.service... May 13 00:44:36.549149 systemd[1]: Starting modprobe@loop.service... May 13 00:44:36.549159 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:44:36.549169 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:44:36.549180 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:44:36.549190 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:44:36.549202 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:44:36.549212 kernel: loop: module loaded May 13 00:44:36.549222 systemd[1]: Stopped systemd-journald.service. May 13 00:44:36.549231 kernel: fuse: init (API version 7.34) May 13 00:44:36.549241 systemd[1]: Starting systemd-journald.service... May 13 00:44:36.549252 systemd[1]: Starting systemd-modules-load.service... May 13 00:44:36.549263 systemd[1]: Starting systemd-network-generator.service... May 13 00:44:36.549274 systemd[1]: Starting systemd-remount-fs.service... May 13 00:44:36.549284 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:44:36.549294 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:44:36.549306 systemd[1]: Stopped verity-setup.service. May 13 00:44:36.549317 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:36.549331 systemd-journald[996]: Journal started May 13 00:44:36.549458 systemd-journald[996]: Runtime Journal (/run/log/journal/8e981de2def842e38c237bb130c0471c) is 6.0M, max 48.5M, 42.5M free. May 13 00:44:32.890000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:44:33.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:44:33.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:44:33.382000 audit: BPF prog-id=10 op=LOAD May 13 00:44:33.382000 audit: BPF prog-id=10 op=UNLOAD May 13 00:44:33.382000 audit: BPF prog-id=11 op=LOAD May 13 00:44:33.382000 audit: BPF prog-id=11 op=UNLOAD May 13 00:44:33.448000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:44:33.448000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0000a27d2 a1=c00009ea80 a2=c0000b0cc0 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.448000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:44:33.450000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:44:33.450000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000a28a9 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:33.450000 audit: CWD cwd="/" May 13 00:44:33.450000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:33.450000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:33.450000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:44:36.374000 audit: BPF prog-id=12 op=LOAD May 13 00:44:36.374000 audit: BPF prog-id=3 op=UNLOAD May 13 00:44:36.374000 audit: BPF prog-id=13 op=LOAD May 13 00:44:36.374000 audit: BPF prog-id=14 op=LOAD May 13 00:44:36.374000 audit: BPF prog-id=4 op=UNLOAD May 13 00:44:36.374000 audit: BPF prog-id=5 op=UNLOAD May 13 00:44:36.375000 audit: BPF prog-id=15 op=LOAD May 13 00:44:36.375000 audit: BPF prog-id=12 op=UNLOAD May 13 00:44:36.376000 audit: BPF prog-id=16 op=LOAD May 13 00:44:36.376000 audit: BPF prog-id=17 op=LOAD May 13 00:44:36.376000 audit: BPF prog-id=13 op=UNLOAD May 13 00:44:36.376000 audit: BPF prog-id=14 op=UNLOAD May 13 00:44:36.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.387000 audit: BPF prog-id=15 op=UNLOAD May 13 00:44:36.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.524000 audit: BPF prog-id=18 op=LOAD May 13 00:44:36.524000 audit: BPF prog-id=19 op=LOAD May 13 00:44:36.524000 audit: BPF prog-id=20 op=LOAD May 13 00:44:36.524000 audit: BPF prog-id=16 op=UNLOAD May 13 00:44:36.524000 audit: BPF prog-id=17 op=UNLOAD May 13 00:44:36.544000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:44:36.544000 audit[996]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffca3787e30 a2=4000 a3=7ffca3787ecc items=0 ppid=1 pid=996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:36.544000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:44:36.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:33.443747 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:44:36.372682 systemd[1]: Queued start job for default target multi-user.target. May 13 00:44:33.446605 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:44:36.372694 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:44:33.446639 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:44:36.377340 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:44:33.446690 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:44:33.446706 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:44:33.446752 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:44:33.446773 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:44:33.447050 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:44:33.447092 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:44:33.447108 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:44:33.447966 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:44:33.448013 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:44:33.448046 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:44:33.448067 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:44:33.448090 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:44:33.448109 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:44:36.030214 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:44:36.030575 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:44:36.030709 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:44:36.030939 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:44:36.031003 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:44:36.031079 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-13T00:44:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:44:36.554454 systemd[1]: Started systemd-journald.service. May 13 00:44:36.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.555426 systemd[1]: Mounted dev-hugepages.mount. May 13 00:44:36.556530 systemd[1]: Mounted dev-mqueue.mount. May 13 00:44:36.557538 systemd[1]: Mounted media.mount. May 13 00:44:36.558496 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:44:36.559596 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:44:36.560714 systemd[1]: Mounted tmp.mount. May 13 00:44:36.561892 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:44:36.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.563346 systemd[1]: Finished kmod-static-nodes.service. May 13 00:44:36.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.564696 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:44:36.564875 systemd[1]: Finished modprobe@configfs.service. May 13 00:44:36.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.566231 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:36.566469 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:36.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.567802 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:44:36.567980 systemd[1]: Finished modprobe@drm.service. May 13 00:44:36.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.569235 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:36.569398 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:36.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.570789 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:44:36.570959 systemd[1]: Finished modprobe@fuse.service. May 13 00:44:36.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.572293 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:44:36.572484 systemd[1]: Finished modprobe@loop.service. May 13 00:44:36.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.573871 systemd[1]: Finished systemd-modules-load.service. May 13 00:44:36.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.575456 systemd[1]: Finished systemd-network-generator.service. May 13 00:44:36.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.576999 systemd[1]: Finished systemd-remount-fs.service. May 13 00:44:36.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.578752 systemd[1]: Reached target network-pre.target. May 13 00:44:36.581374 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:44:36.583720 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:44:36.585062 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:44:36.588249 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:44:36.590564 systemd[1]: Starting systemd-journal-flush.service... May 13 00:44:36.592004 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:44:36.593274 systemd[1]: Starting systemd-random-seed.service... May 13 00:44:36.594726 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:44:36.595978 systemd[1]: Starting systemd-sysctl.service... May 13 00:44:36.599452 systemd-journald[996]: Time spent on flushing to /var/log/journal/8e981de2def842e38c237bb130c0471c is 24.799ms for 1098 entries. May 13 00:44:36.599452 systemd-journald[996]: System Journal (/var/log/journal/8e981de2def842e38c237bb130c0471c) is 8.0M, max 195.6M, 187.6M free. May 13 00:44:36.639563 systemd-journald[996]: Received client request to flush runtime journal. May 13 00:44:36.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.598226 systemd[1]: Starting systemd-sysusers.service... May 13 00:44:36.603517 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:44:36.640470 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:44:36.604987 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:44:36.606424 systemd[1]: Finished systemd-random-seed.service. May 13 00:44:36.607790 systemd[1]: Reached target first-boot-complete.target. May 13 00:44:36.614211 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:44:36.617108 systemd[1]: Starting systemd-udev-settle.service... May 13 00:44:36.618480 systemd[1]: Finished systemd-sysusers.service. May 13 00:44:36.621168 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:44:36.626093 systemd[1]: Finished systemd-sysctl.service. May 13 00:44:36.640861 systemd[1]: Finished systemd-journal-flush.service. May 13 00:44:36.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:36.649063 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:44:36.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.074230 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:44:37.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.075000 audit: BPF prog-id=21 op=LOAD May 13 00:44:37.075000 audit: BPF prog-id=22 op=LOAD May 13 00:44:37.075000 audit: BPF prog-id=7 op=UNLOAD May 13 00:44:37.075000 audit: BPF prog-id=8 op=UNLOAD May 13 00:44:37.076448 systemd[1]: Starting systemd-udevd.service... May 13 00:44:37.092744 systemd-udevd[1019]: Using default interface naming scheme 'v252'. May 13 00:44:37.105778 systemd[1]: Started systemd-udevd.service. May 13 00:44:37.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.107000 audit: BPF prog-id=23 op=LOAD May 13 00:44:37.108695 systemd[1]: Starting systemd-networkd.service... May 13 00:44:37.113000 audit: BPF prog-id=24 op=LOAD May 13 00:44:37.113000 audit: BPF prog-id=25 op=LOAD May 13 00:44:37.113000 audit: BPF prog-id=26 op=LOAD May 13 00:44:37.114334 systemd[1]: Starting systemd-userdbd.service... May 13 00:44:37.144440 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 00:44:37.155100 systemd[1]: Started systemd-userdbd.service. May 13 00:44:37.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.164738 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:44:37.185401 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 00:44:37.189408 kernel: ACPI: button: Power Button [PWRF] May 13 00:44:37.205590 systemd-networkd[1023]: lo: Link UP May 13 00:44:37.205859 systemd-networkd[1023]: lo: Gained carrier May 13 00:44:37.206293 systemd-networkd[1023]: Enumeration completed May 13 00:44:37.206473 systemd[1]: Started systemd-networkd.service. May 13 00:44:37.206915 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:44:37.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.208070 systemd-networkd[1023]: eth0: Link UP May 13 00:44:37.208135 systemd-networkd[1023]: eth0: Gained carrier May 13 00:44:37.204000 audit[1029]: AVC avc: denied { confidentiality } for pid=1029 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 00:44:37.204000 audit[1029]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fd6e7a24d0 a1=338ac a2=7f357c93abc5 a3=5 items=110 ppid=1019 pid=1029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:37.204000 audit: CWD cwd="/" May 13 00:44:37.204000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=1 name=(null) inode=12977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=2 name=(null) inode=12977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=3 name=(null) inode=12978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=4 name=(null) inode=12977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=5 name=(null) inode=12979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=6 name=(null) inode=12977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=7 name=(null) inode=12980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=8 name=(null) inode=12980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=9 name=(null) inode=12981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=10 name=(null) inode=12980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=11 name=(null) inode=12982 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=12 name=(null) inode=12980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=13 name=(null) inode=12983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=14 name=(null) inode=12980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=15 name=(null) inode=12984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=16 name=(null) inode=12980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=17 name=(null) inode=12985 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=18 name=(null) inode=12977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=19 name=(null) inode=12986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=20 name=(null) inode=12986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=21 name=(null) inode=12987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=22 name=(null) inode=12986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=23 name=(null) inode=12988 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=24 name=(null) inode=12986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=25 name=(null) inode=12989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=26 name=(null) inode=12986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=27 name=(null) inode=12990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=28 name=(null) inode=12986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=29 name=(null) inode=12991 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=30 name=(null) inode=12977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=31 name=(null) inode=12992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=32 name=(null) inode=12992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=33 name=(null) inode=12993 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=34 name=(null) inode=12992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=35 name=(null) inode=12994 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=36 name=(null) inode=12992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=37 name=(null) inode=12995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=38 name=(null) inode=12992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=39 name=(null) inode=12996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=40 name=(null) inode=12992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=41 name=(null) inode=12997 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=42 name=(null) inode=12977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=43 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=44 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=45 name=(null) inode=12999 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=46 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=47 name=(null) inode=13000 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=48 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=49 name=(null) inode=13001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=50 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=51 name=(null) inode=13002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=52 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=53 name=(null) inode=13003 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=55 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=56 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=57 name=(null) inode=13005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=58 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=59 name=(null) inode=13006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=60 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=61 name=(null) inode=13007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=62 name=(null) inode=13007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=63 name=(null) inode=13008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=64 name=(null) inode=13007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=65 name=(null) inode=13009 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=66 name=(null) inode=13007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=67 name=(null) inode=13010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=68 name=(null) inode=13007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=69 name=(null) inode=13011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=70 name=(null) inode=13007 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=71 name=(null) inode=13012 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=72 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=73 name=(null) inode=13013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=74 name=(null) inode=13013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=75 name=(null) inode=13014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=76 name=(null) inode=13013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=77 name=(null) inode=13015 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=78 name=(null) inode=13013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=79 name=(null) inode=13016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=80 name=(null) inode=13013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=81 name=(null) inode=13017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=82 name=(null) inode=13013 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=83 name=(null) inode=13018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=84 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=85 name=(null) inode=13019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=86 name=(null) inode=13019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=87 name=(null) inode=13020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=88 name=(null) inode=13019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=89 name=(null) inode=13021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=90 name=(null) inode=13019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=91 name=(null) inode=13022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=92 name=(null) inode=13019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=93 name=(null) inode=13023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=94 name=(null) inode=13019 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=95 name=(null) inode=13024 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=96 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=97 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=98 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=99 name=(null) inode=13026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=100 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=101 name=(null) inode=13027 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=102 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=103 name=(null) inode=13028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=104 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=105 name=(null) inode=13029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=106 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=107 name=(null) inode=13030 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PATH item=109 name=(null) inode=13031 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:44:37.204000 audit: PROCTITLE proctitle="(udev-worker)" May 13 00:44:37.224524 systemd-networkd[1023]: eth0: DHCPv4 address 10.0.0.89/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:44:37.237399 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 00:44:37.245445 kernel: mousedev: PS/2 mouse device common for all mice May 13 00:44:37.247828 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 13 00:44:37.250398 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 13 00:44:37.250561 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 13 00:44:37.289460 kernel: kvm: Nested Virtualization enabled May 13 00:44:37.289652 kernel: SVM: kvm: Nested Paging enabled May 13 00:44:37.289694 kernel: SVM: Virtual VMLOAD VMSAVE supported May 13 00:44:37.289730 kernel: SVM: Virtual GIF supported May 13 00:44:37.312401 kernel: EDAC MC: Ver: 3.0.0 May 13 00:44:37.342827 systemd[1]: Finished systemd-udev-settle.service. May 13 00:44:37.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.344894 systemd[1]: Starting lvm2-activation-early.service... May 13 00:44:37.359646 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:44:37.387513 systemd[1]: Finished lvm2-activation-early.service. May 13 00:44:37.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.388663 systemd[1]: Reached target cryptsetup.target. May 13 00:44:37.390703 systemd[1]: Starting lvm2-activation.service... May 13 00:44:37.394319 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:44:37.421425 systemd[1]: Finished lvm2-activation.service. May 13 00:44:37.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.422544 systemd[1]: Reached target local-fs-pre.target. May 13 00:44:37.423450 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:44:37.423472 systemd[1]: Reached target local-fs.target. May 13 00:44:37.424287 systemd[1]: Reached target machines.target. May 13 00:44:37.426215 systemd[1]: Starting ldconfig.service... May 13 00:44:37.427402 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:37.427460 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:37.428589 systemd[1]: Starting systemd-boot-update.service... May 13 00:44:37.430263 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:44:37.432114 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:44:37.433817 systemd[1]: Starting systemd-sysext.service... May 13 00:44:37.434786 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) May 13 00:44:37.435642 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:44:37.443006 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:44:37.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.445629 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:44:37.448600 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:44:37.448727 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:44:37.458406 kernel: loop0: detected capacity change from 0 to 218376 May 13 00:44:37.474866 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) May 13 00:44:37.474866 systemd-fsck[1065]: /dev/vda1: 790 files, 120692/258078 clusters May 13 00:44:37.478786 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:44:37.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.481998 kernel: kauditd_printk_skb: 231 callbacks suppressed May 13 00:44:37.482057 kernel: audit: type=1130 audit(1747097077.480:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.482457 systemd[1]: Mounting boot.mount... May 13 00:44:37.493586 systemd[1]: Mounted boot.mount. May 13 00:44:37.963076 systemd[1]: Finished systemd-boot-update.service. May 13 00:44:37.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.977396 kernel: audit: type=1130 audit(1747097077.972:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:37.977455 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:44:37.993415 kernel: loop1: detected capacity change from 0 to 218376 May 13 00:44:38.001460 (sd-sysext)[1070]: Using extensions 'kubernetes'. May 13 00:44:38.001796 (sd-sysext)[1070]: Merged extensions into '/usr'. May 13 00:44:38.002403 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:44:38.003988 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:44:38.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.009412 kernel: audit: type=1130 audit(1747097078.004:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.020503 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:38.021799 systemd[1]: Mounting usr-share-oem.mount... May 13 00:44:38.022755 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:38.023741 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:38.025533 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:38.027456 systemd[1]: Starting modprobe@loop.service... May 13 00:44:38.028312 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:38.028495 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:38.028638 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:38.031514 systemd[1]: Mounted usr-share-oem.mount. May 13 00:44:38.032758 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:38.032905 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:38.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.034261 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:38.034434 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:38.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.041253 kernel: audit: type=1130 audit(1747097078.033:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.041297 kernel: audit: type=1131 audit(1747097078.033:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.042423 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:44:38.042569 systemd[1]: Finished modprobe@loop.service. May 13 00:44:38.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.049628 kernel: audit: type=1130 audit(1747097078.041:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.050648 kernel: audit: type=1131 audit(1747097078.041:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.051881 systemd[1]: Finished systemd-sysext.service. May 13 00:44:38.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.054391 kernel: audit: type=1130 audit(1747097078.050:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.054433 kernel: audit: type=1131 audit(1747097078.050:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.061875 systemd[1]: Starting ensure-sysext.service... May 13 00:44:38.063424 kernel: audit: type=1130 audit(1747097078.058:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.063920 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:44:38.063986 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:44:38.064159 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:44:38.065117 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:44:38.070533 systemd[1]: Finished ldconfig.service. May 13 00:44:38.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.071652 systemd[1]: Reloading. May 13 00:44:38.074798 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:44:38.076188 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:44:38.077554 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:44:38.123116 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-13T00:44:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:44:38.123147 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-13T00:44:38Z" level=info msg="torcx already run" May 13 00:44:38.195506 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:44:38.195529 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:44:38.215805 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:44:38.267000 audit: BPF prog-id=27 op=LOAD May 13 00:44:38.267000 audit: BPF prog-id=24 op=UNLOAD May 13 00:44:38.267000 audit: BPF prog-id=28 op=LOAD May 13 00:44:38.267000 audit: BPF prog-id=29 op=LOAD May 13 00:44:38.267000 audit: BPF prog-id=25 op=UNLOAD May 13 00:44:38.267000 audit: BPF prog-id=26 op=UNLOAD May 13 00:44:38.267000 audit: BPF prog-id=30 op=LOAD May 13 00:44:38.267000 audit: BPF prog-id=23 op=UNLOAD May 13 00:44:38.268000 audit: BPF prog-id=31 op=LOAD May 13 00:44:38.268000 audit: BPF prog-id=32 op=LOAD May 13 00:44:38.268000 audit: BPF prog-id=21 op=UNLOAD May 13 00:44:38.268000 audit: BPF prog-id=22 op=UNLOAD May 13 00:44:38.270000 audit: BPF prog-id=33 op=LOAD May 13 00:44:38.270000 audit: BPF prog-id=18 op=UNLOAD May 13 00:44:38.270000 audit: BPF prog-id=34 op=LOAD May 13 00:44:38.270000 audit: BPF prog-id=35 op=LOAD May 13 00:44:38.270000 audit: BPF prog-id=19 op=UNLOAD May 13 00:44:38.270000 audit: BPF prog-id=20 op=UNLOAD May 13 00:44:38.272462 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:44:38.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.276674 systemd[1]: Starting audit-rules.service... May 13 00:44:38.278514 systemd[1]: Starting clean-ca-certificates.service... May 13 00:44:38.280544 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:44:38.282000 audit: BPF prog-id=36 op=LOAD May 13 00:44:38.283157 systemd[1]: Starting systemd-resolved.service... May 13 00:44:38.284000 audit: BPF prog-id=37 op=LOAD May 13 00:44:38.285585 systemd[1]: Starting systemd-timesyncd.service... May 13 00:44:38.287456 systemd[1]: Starting systemd-update-utmp.service... May 13 00:44:38.290000 audit[1149]: SYSTEM_BOOT pid=1149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:44:38.293222 systemd[1]: Finished clean-ca-certificates.service. May 13 00:44:38.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.299836 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:44:38.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.303039 systemd[1]: Finished systemd-update-utmp.service. May 13 00:44:38.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.305732 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:38.305935 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:38.307244 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:38.309165 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:38.311022 systemd[1]: Starting modprobe@loop.service... May 13 00:44:38.311936 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:38.312027 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:38.313160 systemd[1]: Starting systemd-update-done.service... May 13 00:44:38.314142 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:44:38.314232 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:38.315157 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:38.315269 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:38.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.316584 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:38.316680 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:38.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.318283 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:44:38.318431 systemd[1]: Finished modprobe@loop.service. May 13 00:44:38.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.319896 systemd[1]: Finished systemd-update-done.service. May 13 00:44:38.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:38.321502 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:44:38.321611 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:44:38.324000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:44:38.324000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff381a3230 a2=420 a3=0 items=0 ppid=1138 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:38.324000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:44:38.324244 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:38.326200 augenrules[1162]: No rules May 13 00:44:38.324459 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:44:38.325717 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:44:38.327637 systemd[1]: Starting modprobe@drm.service... May 13 00:44:38.329313 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:44:38.331211 systemd[1]: Starting modprobe@loop.service... May 13 00:44:38.332128 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:44:38.332225 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:38.333263 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:44:38.334453 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:44:38.334545 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:44:38.335722 systemd[1]: Finished audit-rules.service. May 13 00:44:38.336957 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:44:38.337064 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:44:38.338328 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:44:38.338459 systemd[1]: Finished modprobe@drm.service. May 13 00:44:38.339785 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:44:38.339884 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:44:38.341215 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:44:38.341310 systemd[1]: Finished modprobe@loop.service. May 13 00:44:38.343928 systemd[1]: Finished ensure-sysext.service. May 13 00:44:38.346163 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:44:38.346201 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:44:38.370768 systemd[1]: Started systemd-timesyncd.service. May 13 00:44:38.372330 systemd[1]: Reached target time-set.target. May 13 00:44:38.373380 systemd-timesyncd[1148]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:44:38.373446 systemd-timesyncd[1148]: Initial clock synchronization to Tue 2025-05-13 00:44:38.225317 UTC. May 13 00:44:38.383724 systemd-resolved[1143]: Positive Trust Anchors: May 13 00:44:38.383740 systemd-resolved[1143]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:44:38.383766 systemd-resolved[1143]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:44:38.391701 systemd-resolved[1143]: Defaulting to hostname 'linux'. May 13 00:44:38.393147 systemd[1]: Started systemd-resolved.service. May 13 00:44:38.394391 systemd[1]: Reached target network.target. May 13 00:44:38.395399 systemd[1]: Reached target nss-lookup.target. May 13 00:44:38.396516 systemd[1]: Reached target sysinit.target. May 13 00:44:38.397531 systemd[1]: Started motdgen.path. May 13 00:44:38.398441 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:44:38.400046 systemd[1]: Started logrotate.timer. May 13 00:44:38.401139 systemd[1]: Started mdadm.timer. May 13 00:44:38.402055 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:44:38.403179 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:44:38.403214 systemd[1]: Reached target paths.target. May 13 00:44:38.404191 systemd[1]: Reached target timers.target. May 13 00:44:38.405598 systemd[1]: Listening on dbus.socket. May 13 00:44:38.407741 systemd[1]: Starting docker.socket... May 13 00:44:38.411238 systemd[1]: Listening on sshd.socket. May 13 00:44:38.412315 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:38.412780 systemd[1]: Listening on docker.socket. May 13 00:44:38.413829 systemd[1]: Reached target sockets.target. May 13 00:44:38.414858 systemd[1]: Reached target basic.target. May 13 00:44:38.415838 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:44:38.415858 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:44:38.416836 systemd[1]: Starting containerd.service... May 13 00:44:38.418525 systemd[1]: Starting dbus.service... May 13 00:44:38.420057 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:44:38.421862 systemd[1]: Starting extend-filesystems.service... May 13 00:44:38.422911 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:44:38.423854 systemd[1]: Starting motdgen.service... May 13 00:44:38.428025 jq[1177]: false May 13 00:44:38.428120 systemd[1]: Starting prepare-helm.service... May 13 00:44:38.429906 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:44:38.431912 systemd[1]: Starting sshd-keygen.service... May 13 00:44:38.433772 extend-filesystems[1178]: Found loop1 May 13 00:44:38.434910 extend-filesystems[1178]: Found sr0 May 13 00:44:38.434910 extend-filesystems[1178]: Found vda May 13 00:44:38.434910 extend-filesystems[1178]: Found vda1 May 13 00:44:38.434910 extend-filesystems[1178]: Found vda2 May 13 00:44:38.434910 extend-filesystems[1178]: Found vda3 May 13 00:44:38.434910 extend-filesystems[1178]: Found usr May 13 00:44:38.434910 extend-filesystems[1178]: Found vda4 May 13 00:44:38.434910 extend-filesystems[1178]: Found vda6 May 13 00:44:38.434910 extend-filesystems[1178]: Found vda7 May 13 00:44:38.434910 extend-filesystems[1178]: Found vda9 May 13 00:44:38.434910 extend-filesystems[1178]: Checking size of /dev/vda9 May 13 00:44:38.436764 systemd[1]: Starting systemd-logind.service... May 13 00:44:38.456047 dbus-daemon[1176]: [system] SELinux support is enabled May 13 00:44:38.438744 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:44:38.438788 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:44:38.439142 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:44:38.458086 jq[1191]: true May 13 00:44:38.439758 systemd[1]: Starting update-engine.service... May 13 00:44:38.441047 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:44:38.458756 tar[1197]: linux-amd64/LICENSE May 13 00:44:38.458756 tar[1197]: linux-amd64/helm May 13 00:44:38.443503 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:44:38.443672 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:44:38.446782 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:44:38.446911 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:44:38.456182 systemd[1]: Started dbus.service. May 13 00:44:38.463607 jq[1200]: true May 13 00:44:38.461292 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:44:38.461317 systemd[1]: Reached target system-config.target. May 13 00:44:38.462260 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:44:38.462280 systemd[1]: Reached target user-config.target. May 13 00:44:38.476079 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:44:38.479598 extend-filesystems[1178]: Resized partition /dev/vda9 May 13 00:44:38.476219 systemd[1]: Finished motdgen.service. May 13 00:44:38.483653 extend-filesystems[1213]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:44:38.485180 update_engine[1190]: I0513 00:44:38.485042 1190 main.cc:92] Flatcar Update Engine starting May 13 00:44:38.486655 systemd[1]: Started update-engine.service. May 13 00:44:38.486729 update_engine[1190]: I0513 00:44:38.486703 1190 update_check_scheduler.cc:74] Next update check in 10m14s May 13 00:44:38.489344 env[1198]: time="2025-05-13T00:44:38.488688966Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:44:38.491406 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:44:38.492644 systemd[1]: Started locksmithd.service. May 13 00:44:38.511738 systemd-logind[1188]: Watching system buttons on /dev/input/event1 (Power Button) May 13 00:44:38.511758 systemd-logind[1188]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 00:44:38.513396 systemd-logind[1188]: New seat seat0. May 13 00:44:38.516101 systemd[1]: Started systemd-logind.service. May 13 00:44:38.522629 env[1198]: time="2025-05-13T00:44:38.522585120Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:44:38.522941 env[1198]: time="2025-05-13T00:44:38.522922513Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:44:38.524199 env[1198]: time="2025-05-13T00:44:38.524170966Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:44:38.524294 env[1198]: time="2025-05-13T00:44:38.524270453Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:44:38.524412 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:44:38.548062 locksmithd[1230]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.549720357Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.549760383Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.549782234Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.549795899Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.549896628Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.550180431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.550326835Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.550348947Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.550436792Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:44:38.550979 env[1198]: time="2025-05-13T00:44:38.550456088Z" level=info msg="metadata content store policy set" policy=shared May 13 00:44:38.551225 extend-filesystems[1213]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:44:38.551225 extend-filesystems[1213]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:44:38.551225 extend-filesystems[1213]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:44:38.550665 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:44:38.557307 extend-filesystems[1178]: Resized filesystem in /dev/vda9 May 13 00:44:38.550875 systemd[1]: Finished extend-filesystems.service. May 13 00:44:38.560420 bash[1231]: Updated "/home/core/.ssh/authorized_keys" May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562642986Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562682941Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562694813Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562726062Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562741711Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562753654Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562765345Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562778540Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562790583Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562804689Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562821601Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562837621Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.562950222Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:44:38.563067 env[1198]: time="2025-05-13T00:44:38.563019743Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:44:38.561123 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563226531Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563246969Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563257689Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563296943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563307833Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563318724Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563328222Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563338791Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563351365Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563435383Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563450311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563580 env[1198]: time="2025-05-13T00:44:38.563464457Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:44:38.563950 env[1198]: time="2025-05-13T00:44:38.563589993Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563950 env[1198]: time="2025-05-13T00:44:38.563605412Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563950 env[1198]: time="2025-05-13T00:44:38.563622915Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:44:38.563950 env[1198]: time="2025-05-13T00:44:38.563633294Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:44:38.563950 env[1198]: time="2025-05-13T00:44:38.563647711Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:44:38.563950 env[1198]: time="2025-05-13T00:44:38.563658882Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:44:38.563950 env[1198]: time="2025-05-13T00:44:38.563675213Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:44:38.563950 env[1198]: time="2025-05-13T00:44:38.563709066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:44:38.564182 env[1198]: time="2025-05-13T00:44:38.563885477Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:44:38.564182 env[1198]: time="2025-05-13T00:44:38.563932876Z" level=info msg="Connect containerd service" May 13 00:44:38.564182 env[1198]: time="2025-05-13T00:44:38.563963935Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:44:38.564938 env[1198]: time="2025-05-13T00:44:38.564565994Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:44:38.564976 env[1198]: time="2025-05-13T00:44:38.564922784Z" level=info msg="Start subscribing containerd event" May 13 00:44:38.568608 env[1198]: time="2025-05-13T00:44:38.565774281Z" level=info msg="Start recovering state" May 13 00:44:38.568608 env[1198]: time="2025-05-13T00:44:38.565916659Z" level=info msg="Start event monitor" May 13 00:44:38.568608 env[1198]: time="2025-05-13T00:44:38.565944711Z" level=info msg="Start snapshots syncer" May 13 00:44:38.568608 env[1198]: time="2025-05-13T00:44:38.565961363Z" level=info msg="Start cni network conf syncer for default" May 13 00:44:38.568608 env[1198]: time="2025-05-13T00:44:38.565972534Z" level=info msg="Start streaming server" May 13 00:44:38.568608 env[1198]: time="2025-05-13T00:44:38.566717582Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:44:38.568608 env[1198]: time="2025-05-13T00:44:38.566794326Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:44:38.568608 env[1198]: time="2025-05-13T00:44:38.566951901Z" level=info msg="containerd successfully booted in 0.079026s" May 13 00:44:38.567050 systemd[1]: Started containerd.service. May 13 00:44:38.906336 tar[1197]: linux-amd64/README.md May 13 00:44:38.911514 systemd[1]: Finished prepare-helm.service. May 13 00:44:39.102661 systemd-networkd[1023]: eth0: Gained IPv6LL May 13 00:44:39.104262 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:44:39.105689 systemd[1]: Reached target network-online.target. May 13 00:44:39.108011 systemd[1]: Starting kubelet.service... May 13 00:44:39.756982 systemd[1]: Started kubelet.service. May 13 00:44:40.152870 kubelet[1246]: E0513 00:44:40.152809 1246 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:44:40.154486 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:44:40.154596 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:44:40.267295 sshd_keygen[1203]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:44:40.286588 systemd[1]: Finished sshd-keygen.service. May 13 00:44:40.288714 systemd[1]: Starting issuegen.service... May 13 00:44:40.293261 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:44:40.293405 systemd[1]: Finished issuegen.service. May 13 00:44:40.295261 systemd[1]: Starting systemd-user-sessions.service... May 13 00:44:40.301144 systemd[1]: Finished systemd-user-sessions.service. May 13 00:44:40.303434 systemd[1]: Started getty@tty1.service. May 13 00:44:40.305123 systemd[1]: Started serial-getty@ttyS0.service. May 13 00:44:40.306155 systemd[1]: Reached target getty.target. May 13 00:44:40.307016 systemd[1]: Reached target multi-user.target. May 13 00:44:40.308864 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:44:40.314969 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:44:40.315086 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:44:40.316197 systemd[1]: Startup finished in 646ms (kernel) + 5.124s (initrd) + 7.475s (userspace) = 13.246s. May 13 00:44:41.339116 systemd[1]: Created slice system-sshd.slice. May 13 00:44:41.340077 systemd[1]: Started sshd@0-10.0.0.89:22-10.0.0.1:47972.service. May 13 00:44:41.380034 sshd[1268]: Accepted publickey for core from 10.0.0.1 port 47972 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:44:41.381333 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:41.388271 systemd[1]: Created slice user-500.slice. May 13 00:44:41.389264 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:44:41.390946 systemd-logind[1188]: New session 1 of user core. May 13 00:44:41.396817 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:44:41.397918 systemd[1]: Starting user@500.service... May 13 00:44:41.400198 (systemd)[1271]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:41.482631 systemd[1271]: Queued start job for default target default.target. May 13 00:44:41.483059 systemd[1271]: Reached target paths.target. May 13 00:44:41.483089 systemd[1271]: Reached target sockets.target. May 13 00:44:41.483102 systemd[1271]: Reached target timers.target. May 13 00:44:41.483112 systemd[1271]: Reached target basic.target. May 13 00:44:41.483146 systemd[1271]: Reached target default.target. May 13 00:44:41.483167 systemd[1271]: Startup finished in 77ms. May 13 00:44:41.483246 systemd[1]: Started user@500.service. May 13 00:44:41.484202 systemd[1]: Started session-1.scope. May 13 00:44:41.534917 systemd[1]: Started sshd@1-10.0.0.89:22-10.0.0.1:47974.service. May 13 00:44:41.572496 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 47974 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:44:41.573627 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:41.576690 systemd-logind[1188]: New session 2 of user core. May 13 00:44:41.577541 systemd[1]: Started session-2.scope. May 13 00:44:41.629047 sshd[1280]: pam_unix(sshd:session): session closed for user core May 13 00:44:41.632268 systemd[1]: sshd@1-10.0.0.89:22-10.0.0.1:47974.service: Deactivated successfully. May 13 00:44:41.632882 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:44:41.633442 systemd-logind[1188]: Session 2 logged out. Waiting for processes to exit. May 13 00:44:41.634510 systemd[1]: Started sshd@2-10.0.0.89:22-10.0.0.1:47988.service. May 13 00:44:41.635307 systemd-logind[1188]: Removed session 2. May 13 00:44:41.672871 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 47988 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:44:41.674276 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:41.678750 systemd-logind[1188]: New session 3 of user core. May 13 00:44:41.679815 systemd[1]: Started session-3.scope. May 13 00:44:41.729072 sshd[1286]: pam_unix(sshd:session): session closed for user core May 13 00:44:41.732248 systemd[1]: sshd@2-10.0.0.89:22-10.0.0.1:47988.service: Deactivated successfully. May 13 00:44:41.732826 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:44:41.733317 systemd-logind[1188]: Session 3 logged out. Waiting for processes to exit. May 13 00:44:41.734506 systemd[1]: Started sshd@3-10.0.0.89:22-10.0.0.1:48002.service. May 13 00:44:41.735193 systemd-logind[1188]: Removed session 3. May 13 00:44:41.771987 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 48002 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:44:41.773117 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:41.776169 systemd-logind[1188]: New session 4 of user core. May 13 00:44:41.776887 systemd[1]: Started session-4.scope. May 13 00:44:41.829881 sshd[1292]: pam_unix(sshd:session): session closed for user core May 13 00:44:41.832082 systemd[1]: sshd@3-10.0.0.89:22-10.0.0.1:48002.service: Deactivated successfully. May 13 00:44:41.832602 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:44:41.833087 systemd-logind[1188]: Session 4 logged out. Waiting for processes to exit. May 13 00:44:41.833939 systemd[1]: Started sshd@4-10.0.0.89:22-10.0.0.1:48008.service. May 13 00:44:41.834683 systemd-logind[1188]: Removed session 4. May 13 00:44:41.870582 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 48008 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:44:41.871558 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:41.874556 systemd-logind[1188]: New session 5 of user core. May 13 00:44:41.875272 systemd[1]: Started session-5.scope. May 13 00:44:41.928489 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:44:41.928685 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:44:41.940598 dbus-daemon[1176]: \xd0- \xa3\xf5U: received setenforce notice (enforcing=-1163950976) May 13 00:44:41.942688 sudo[1301]: pam_unix(sudo:session): session closed for user root May 13 00:44:41.944435 sshd[1298]: pam_unix(sshd:session): session closed for user core May 13 00:44:41.947033 systemd[1]: sshd@4-10.0.0.89:22-10.0.0.1:48008.service: Deactivated successfully. May 13 00:44:41.947602 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:44:41.948095 systemd-logind[1188]: Session 5 logged out. Waiting for processes to exit. May 13 00:44:41.949157 systemd[1]: Started sshd@5-10.0.0.89:22-10.0.0.1:48024.service. May 13 00:44:41.949856 systemd-logind[1188]: Removed session 5. May 13 00:44:41.987234 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 48024 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:44:41.988259 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:41.991604 systemd-logind[1188]: New session 6 of user core. May 13 00:44:41.992638 systemd[1]: Started session-6.scope. May 13 00:44:42.043281 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:44:42.043480 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:44:42.046282 sudo[1309]: pam_unix(sudo:session): session closed for user root May 13 00:44:42.050613 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:44:42.050801 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:44:42.059109 systemd[1]: Stopping audit-rules.service... May 13 00:44:42.058000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:44:42.058000 audit[1312]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffdeec3cb0 a2=420 a3=0 items=0 ppid=1 pid=1312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.058000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:44:42.060504 auditctl[1312]: No rules May 13 00:44:42.060794 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:44:42.060978 systemd[1]: Stopped audit-rules.service. May 13 00:44:42.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:42.062378 systemd[1]: Starting audit-rules.service... May 13 00:44:42.076542 augenrules[1329]: No rules May 13 00:44:42.076964 systemd[1]: Finished audit-rules.service. May 13 00:44:42.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:42.077790 sudo[1308]: pam_unix(sudo:session): session closed for user root May 13 00:44:42.076000 audit[1308]: USER_END pid=1308 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:42.076000 audit[1308]: CRED_DISP pid=1308 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:42.079134 sshd[1305]: pam_unix(sshd:session): session closed for user core May 13 00:44:42.079000 audit[1305]: USER_END pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:42.079000 audit[1305]: CRED_DISP pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:42.081555 systemd[1]: sshd@5-10.0.0.89:22-10.0.0.1:48024.service: Deactivated successfully. May 13 00:44:42.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.89:22-10.0.0.1:48024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:42.082008 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:44:42.082429 systemd-logind[1188]: Session 6 logged out. Waiting for processes to exit. May 13 00:44:42.083145 systemd[1]: Started sshd@6-10.0.0.89:22-10.0.0.1:48026.service. May 13 00:44:42.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:48026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:42.083814 systemd-logind[1188]: Removed session 6. May 13 00:44:42.118000 audit[1335]: USER_ACCT pid=1335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:42.119926 sshd[1335]: Accepted publickey for core from 10.0.0.1 port 48026 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:44:42.119000 audit[1335]: CRED_ACQ pid=1335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:42.119000 audit[1335]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2edeb0b0 a2=3 a3=0 items=0 ppid=1 pid=1335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:44:42.120791 sshd[1335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:44:42.123873 systemd-logind[1188]: New session 7 of user core. May 13 00:44:42.124691 systemd[1]: Started session-7.scope. May 13 00:44:42.126000 audit[1335]: USER_START pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:42.127000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:44:42.174000 audit[1338]: USER_ACCT pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:42.175122 sudo[1338]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:44:42.174000 audit[1338]: CRED_REFR pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:42.175311 sudo[1338]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:44:42.176000 audit[1338]: USER_START pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:44:42.194140 systemd[1]: Starting docker.service... May 13 00:44:42.226584 env[1350]: time="2025-05-13T00:44:42.226527227Z" level=info msg="Starting up" May 13 00:44:42.227844 env[1350]: time="2025-05-13T00:44:42.227801472Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:44:42.227844 env[1350]: time="2025-05-13T00:44:42.227825259Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:44:42.227910 env[1350]: time="2025-05-13T00:44:42.227844168Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:44:42.227910 env[1350]: time="2025-05-13T00:44:42.227853142Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:44:42.231203 env[1350]: time="2025-05-13T00:44:42.231173605Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:44:42.231203 env[1350]: time="2025-05-13T00:44:42.231192662Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:44:42.231279 env[1350]: time="2025-05-13T00:44:42.231206931Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:44:42.231279 env[1350]: time="2025-05-13T00:44:42.231215321Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:44:42.783039 env[1350]: time="2025-05-13T00:44:42.782984629Z" level=info msg="Loading containers: start." May 13 00:44:42.828000 audit[1384]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.830586 kernel: kauditd_printk_skb: 57 callbacks suppressed May 13 00:44:42.830650 kernel: audit: type=1325 audit(1747097082.828:214): table=nat:2 family=2 entries=2 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.828000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc00516750 a2=0 a3=7ffc0051673c items=0 ppid=1350 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.837877 kernel: audit: type=1300 audit(1747097082.828:214): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc00516750 a2=0 a3=7ffc0051673c items=0 ppid=1350 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.837928 kernel: audit: type=1327 audit(1747097082.828:214): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:44:42.828000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:44:42.839816 kernel: audit: type=1325 audit(1747097082.829:215): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.829000 audit[1386]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.829000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff7b57ca90 a2=0 a3=7fff7b57ca7c items=0 ppid=1350 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.846486 kernel: audit: type=1300 audit(1747097082.829:215): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff7b57ca90 a2=0 a3=7fff7b57ca7c items=0 ppid=1350 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.846514 kernel: audit: type=1327 audit(1747097082.829:215): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:44:42.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:44:42.848508 kernel: audit: type=1325 audit(1747097082.831:216): table=filter:4 family=2 entries=1 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.831000 audit[1388]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.850671 kernel: audit: type=1300 audit(1747097082.831:216): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd2a0d4080 a2=0 a3=7ffd2a0d406c items=0 ppid=1350 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.831000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd2a0d4080 a2=0 a3=7ffd2a0d406c items=0 ppid=1350 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.855225 kernel: audit: type=1327 audit(1747097082.831:216): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:44:42.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:44:42.857683 kernel: audit: type=1325 audit(1747097082.832:217): table=filter:5 family=2 entries=1 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.832000 audit[1390]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.832000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff47df51a0 a2=0 a3=7fff47df518c items=0 ppid=1350 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.832000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:44:42.834000 audit[1392]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.834000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd3cf46450 a2=0 a3=7ffd3cf4643c items=0 ppid=1350 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 00:44:42.879000 audit[1397]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.879000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec8b903f0 a2=0 a3=7ffec8b903dc items=0 ppid=1350 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 00:44:42.887000 audit[1399]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.887000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe33024290 a2=0 a3=7ffe3302427c items=0 ppid=1350 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 00:44:42.890000 audit[1401]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.890000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe2d292a20 a2=0 a3=7ffe2d292a0c items=0 ppid=1350 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.890000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 00:44:42.891000 audit[1403]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.891000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffa34ba7b0 a2=0 a3=7fffa34ba79c items=0 ppid=1350 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.891000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:44:42.899000 audit[1407]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.899000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffed19fa5a0 a2=0 a3=7ffed19fa58c items=0 ppid=1350 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.899000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:44:42.908000 audit[1408]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.908000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd775f34a0 a2=0 a3=7ffd775f348c items=0 ppid=1350 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.908000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:44:42.920387 kernel: Initializing XFRM netlink socket May 13 00:44:42.948397 env[1350]: time="2025-05-13T00:44:42.948338955Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 00:44:42.964000 audit[1416]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.964000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc7f3ac770 a2=0 a3=7ffc7f3ac75c items=0 ppid=1350 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 00:44:42.979000 audit[1419]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.979000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffef543fbc0 a2=0 a3=7ffef543fbac items=0 ppid=1350 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 00:44:42.981000 audit[1422]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.981000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe439d0420 a2=0 a3=7ffe439d040c items=0 ppid=1350 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.981000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 00:44:42.983000 audit[1424]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.983000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff5d9c2930 a2=0 a3=7fff5d9c291c items=0 ppid=1350 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.983000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 00:44:42.984000 audit[1426]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.984000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff77b85bf0 a2=0 a3=7fff77b85bdc items=0 ppid=1350 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.984000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 00:44:42.986000 audit[1428]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.986000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffc2c42820 a2=0 a3=7fffc2c4280c items=0 ppid=1350 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 00:44:42.987000 audit[1430]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.987000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd6c01e5e0 a2=0 a3=7ffd6c01e5cc items=0 ppid=1350 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 00:44:42.995000 audit[1433]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.995000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffff20ef100 a2=0 a3=7ffff20ef0ec items=0 ppid=1350 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.995000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 00:44:42.996000 audit[1435]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.996000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdd138dc00 a2=0 a3=7ffdd138dbec items=0 ppid=1350 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:44:42.998000 audit[1437]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:42.998000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff636de360 a2=0 a3=7fff636de34c items=0 ppid=1350 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:42.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:44:43.000000 audit[1439]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:43.000000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd776f4960 a2=0 a3=7ffd776f494c items=0 ppid=1350 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:43.000000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 00:44:43.002141 systemd-networkd[1023]: docker0: Link UP May 13 00:44:43.010000 audit[1443]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:43.010000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff89118620 a2=0 a3=7fff8911860c items=0 ppid=1350 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:43.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:44:43.014000 audit[1444]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:44:43.014000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdce7ff870 a2=0 a3=7ffdce7ff85c items=0 ppid=1350 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:44:43.014000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:44:43.016613 env[1350]: time="2025-05-13T00:44:43.016576444Z" level=info msg="Loading containers: done." May 13 00:44:43.031121 env[1350]: time="2025-05-13T00:44:43.031060179Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 00:44:43.031268 env[1350]: time="2025-05-13T00:44:43.031247531Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 00:44:43.031358 env[1350]: time="2025-05-13T00:44:43.031333829Z" level=info msg="Daemon has completed initialization" May 13 00:44:43.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:43.048582 systemd[1]: Started docker.service. May 13 00:44:43.054282 env[1350]: time="2025-05-13T00:44:43.054229487Z" level=info msg="API listen on /run/docker.sock" May 13 00:44:43.736660 env[1198]: time="2025-05-13T00:44:43.736608175Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 13 00:44:44.762074 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount836620931.mount: Deactivated successfully. May 13 00:44:47.106949 env[1198]: time="2025-05-13T00:44:47.106879518Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:47.109170 env[1198]: time="2025-05-13T00:44:47.109102738Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:47.110968 env[1198]: time="2025-05-13T00:44:47.110907782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:47.112871 env[1198]: time="2025-05-13T00:44:47.112837972Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:47.113863 env[1198]: time="2025-05-13T00:44:47.113832878Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 13 00:44:47.114810 env[1198]: time="2025-05-13T00:44:47.114785814Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 13 00:44:49.933724 env[1198]: time="2025-05-13T00:44:49.933657460Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:49.935965 env[1198]: time="2025-05-13T00:44:49.935900651Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:49.937992 env[1198]: time="2025-05-13T00:44:49.937943068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:49.939930 env[1198]: time="2025-05-13T00:44:49.939899241Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:49.940765 env[1198]: time="2025-05-13T00:44:49.940726906Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 13 00:44:49.941307 env[1198]: time="2025-05-13T00:44:49.941273952Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 13 00:44:50.342493 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 00:44:50.342704 systemd[1]: Stopped kubelet.service. May 13 00:44:50.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:50.343590 kernel: kauditd_printk_skb: 63 callbacks suppressed May 13 00:44:50.343640 kernel: audit: type=1130 audit(1747097090.342:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:50.344154 systemd[1]: Starting kubelet.service... May 13 00:44:50.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:50.349629 kernel: audit: type=1131 audit(1747097090.342:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:50.424537 systemd[1]: Started kubelet.service. May 13 00:44:50.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:50.429414 kernel: audit: type=1130 audit(1747097090.423:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:44:50.537696 kubelet[1485]: E0513 00:44:50.537623 1485 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:44:50.541104 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:44:50.541224 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:44:50.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:44:50.558409 kernel: audit: type=1131 audit(1747097090.541:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:44:52.388635 env[1198]: time="2025-05-13T00:44:52.388553157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:52.390859 env[1198]: time="2025-05-13T00:44:52.390796715Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:52.392919 env[1198]: time="2025-05-13T00:44:52.392877667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:52.394959 env[1198]: time="2025-05-13T00:44:52.394922619Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:52.395920 env[1198]: time="2025-05-13T00:44:52.395850602Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 13 00:44:52.396475 env[1198]: time="2025-05-13T00:44:52.396432684Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 13 00:44:53.591740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3861904286.mount: Deactivated successfully. May 13 00:44:54.894988 env[1198]: time="2025-05-13T00:44:54.894911672Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:54.897588 env[1198]: time="2025-05-13T00:44:54.897527739Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:54.898969 env[1198]: time="2025-05-13T00:44:54.898915717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:54.900224 env[1198]: time="2025-05-13T00:44:54.900186089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:54.900615 env[1198]: time="2025-05-13T00:44:54.900579304Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 13 00:44:54.901131 env[1198]: time="2025-05-13T00:44:54.901106647Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 13 00:44:55.425832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3592664788.mount: Deactivated successfully. May 13 00:44:56.358017 env[1198]: time="2025-05-13T00:44:56.357956834Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:56.359762 env[1198]: time="2025-05-13T00:44:56.359732074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:56.361452 env[1198]: time="2025-05-13T00:44:56.361423546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:56.363152 env[1198]: time="2025-05-13T00:44:56.363126377Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:56.364007 env[1198]: time="2025-05-13T00:44:56.363978629Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 13 00:44:56.364444 env[1198]: time="2025-05-13T00:44:56.364427573Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 13 00:44:56.866181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount594148896.mount: Deactivated successfully. May 13 00:44:57.006880 env[1198]: time="2025-05-13T00:44:57.006807454Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:57.011295 env[1198]: time="2025-05-13T00:44:57.011235572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:57.014188 env[1198]: time="2025-05-13T00:44:57.014121293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:57.015805 env[1198]: time="2025-05-13T00:44:57.015773892Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:44:57.016203 env[1198]: time="2025-05-13T00:44:57.016162742Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 13 00:44:57.016810 env[1198]: time="2025-05-13T00:44:57.016781448Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 13 00:44:58.461833 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2910104257.mount: Deactivated successfully. May 13 00:45:00.592734 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 00:45:00.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:00.592982 systemd[1]: Stopped kubelet.service. May 13 00:45:00.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:00.599719 kernel: audit: type=1130 audit(1747097100.591:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:00.599769 kernel: audit: type=1131 audit(1747097100.591:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:00.662177 systemd[1]: Starting kubelet.service... May 13 00:45:00.742214 systemd[1]: Started kubelet.service. May 13 00:45:00.746865 kernel: audit: type=1130 audit(1747097100.741:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:00.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:00.808570 kubelet[1496]: E0513 00:45:00.808526 1496 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:45:00.810462 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:45:00.810574 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:45:00.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:45:00.814381 kernel: audit: type=1131 audit(1747097100.809:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:45:02.296127 env[1198]: time="2025-05-13T00:45:02.296053224Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:02.298503 env[1198]: time="2025-05-13T00:45:02.298437075Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:02.300740 env[1198]: time="2025-05-13T00:45:02.300685918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:02.303386 env[1198]: time="2025-05-13T00:45:02.303318403Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:02.304476 env[1198]: time="2025-05-13T00:45:02.304422989Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 13 00:45:05.279401 systemd[1]: Stopped kubelet.service. May 13 00:45:05.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:05.281760 systemd[1]: Starting kubelet.service... May 13 00:45:05.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:05.287206 kernel: audit: type=1130 audit(1747097105.278:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:05.287335 kernel: audit: type=1131 audit(1747097105.278:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:05.306012 systemd[1]: Reloading. May 13 00:45:05.371782 /usr/lib/systemd/system-generators/torcx-generator[1551]: time="2025-05-13T00:45:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:45:05.372139 /usr/lib/systemd/system-generators/torcx-generator[1551]: time="2025-05-13T00:45:05Z" level=info msg="torcx already run" May 13 00:45:05.609661 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:45:05.609675 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:45:05.626394 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:45:05.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701190 kernel: audit: type=1400 audit(1747097105.692:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701270 kernel: audit: type=1400 audit(1747097105.692:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701299 kernel: audit: type=1400 audit(1747097105.692:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.704958 kernel: audit: type=1400 audit(1747097105.692:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.708727 kernel: audit: type=1400 audit(1747097105.692:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.712565 kernel: audit: type=1400 audit(1747097105.692:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.716301 kernel: audit: type=1400 audit(1747097105.692:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.720060 kernel: audit: type=1400 audit(1747097105.692:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723698 kernel: audit: type=1400 audit(1747097105.692:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.730844 kernel: audit: type=1400 audit(1747097105.699:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.699000 audit: BPF prog-id=43 op=LOAD May 13 00:45:05.699000 audit: BPF prog-id=36 op=UNLOAD May 13 00:45:05.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit: BPF prog-id=44 op=LOAD May 13 00:45:05.707000 audit: BPF prog-id=27 op=UNLOAD May 13 00:45:05.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit: BPF prog-id=45 op=LOAD May 13 00:45:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.722000 audit: BPF prog-id=46 op=LOAD May 13 00:45:05.722000 audit: BPF prog-id=28 op=UNLOAD May 13 00:45:05.722000 audit: BPF prog-id=29 op=UNLOAD May 13 00:45:05.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.725000 audit: BPF prog-id=47 op=LOAD May 13 00:45:05.725000 audit: BPF prog-id=30 op=UNLOAD May 13 00:45:05.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit: BPF prog-id=48 op=LOAD May 13 00:45:05.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.729000 audit: BPF prog-id=49 op=LOAD May 13 00:45:05.729000 audit: BPF prog-id=31 op=UNLOAD May 13 00:45:05.729000 audit: BPF prog-id=32 op=UNLOAD May 13 00:45:05.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.732000 audit: BPF prog-id=50 op=LOAD May 13 00:45:05.733000 audit: BPF prog-id=38 op=UNLOAD May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit: BPF prog-id=51 op=LOAD May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit: BPF prog-id=52 op=LOAD May 13 00:45:05.733000 audit: BPF prog-id=39 op=UNLOAD May 13 00:45:05.733000 audit: BPF prog-id=40 op=UNLOAD May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit: BPF prog-id=53 op=LOAD May 13 00:45:05.734000 audit: BPF prog-id=41 op=UNLOAD May 13 00:45:05.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.734000 audit: BPF prog-id=54 op=LOAD May 13 00:45:05.734000 audit: BPF prog-id=37 op=UNLOAD May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit: BPF prog-id=55 op=LOAD May 13 00:45:05.737000 audit: BPF prog-id=33 op=UNLOAD May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit: BPF prog-id=56 op=LOAD May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:05.737000 audit: BPF prog-id=57 op=LOAD May 13 00:45:05.737000 audit: BPF prog-id=34 op=UNLOAD May 13 00:45:05.737000 audit: BPF prog-id=35 op=UNLOAD May 13 00:45:05.753153 systemd[1]: Started kubelet.service. May 13 00:45:05.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:05.755304 systemd[1]: Stopping kubelet.service... May 13 00:45:05.755664 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:45:05.755882 systemd[1]: Stopped kubelet.service. May 13 00:45:05.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:05.757820 systemd[1]: Starting kubelet.service... May 13 00:45:05.857077 systemd[1]: Started kubelet.service. May 13 00:45:05.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:05.904385 kubelet[1599]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:45:05.904385 kubelet[1599]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 00:45:05.904385 kubelet[1599]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:45:05.904765 kubelet[1599]: I0513 00:45:05.904481 1599 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:45:06.345216 kubelet[1599]: I0513 00:45:06.345162 1599 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 00:45:06.345216 kubelet[1599]: I0513 00:45:06.345196 1599 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:45:06.345537 kubelet[1599]: I0513 00:45:06.345515 1599 server.go:954] "Client rotation is on, will bootstrap in background" May 13 00:45:06.375336 kubelet[1599]: E0513 00:45:06.375287 1599 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.89:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:06.376251 kubelet[1599]: I0513 00:45:06.376221 1599 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:45:06.386282 kubelet[1599]: E0513 00:45:06.386247 1599 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:45:06.386432 kubelet[1599]: I0513 00:45:06.386395 1599 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:45:06.391810 kubelet[1599]: I0513 00:45:06.391785 1599 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:45:06.392885 kubelet[1599]: I0513 00:45:06.392843 1599 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:45:06.393092 kubelet[1599]: I0513 00:45:06.392879 1599 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:45:06.393092 kubelet[1599]: I0513 00:45:06.393080 1599 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:45:06.393219 kubelet[1599]: I0513 00:45:06.393097 1599 container_manager_linux.go:304] "Creating device plugin manager" May 13 00:45:06.393219 kubelet[1599]: I0513 00:45:06.393214 1599 state_mem.go:36] "Initialized new in-memory state store" May 13 00:45:06.395614 kubelet[1599]: I0513 00:45:06.395595 1599 kubelet.go:446] "Attempting to sync node with API server" May 13 00:45:06.395646 kubelet[1599]: I0513 00:45:06.395625 1599 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:45:06.395646 kubelet[1599]: I0513 00:45:06.395642 1599 kubelet.go:352] "Adding apiserver pod source" May 13 00:45:06.395699 kubelet[1599]: I0513 00:45:06.395653 1599 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:45:06.414442 kubelet[1599]: I0513 00:45:06.414405 1599 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:45:06.414821 kubelet[1599]: I0513 00:45:06.414795 1599 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:45:06.419126 kubelet[1599]: W0513 00:45:06.419089 1599 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:45:06.431182 kubelet[1599]: W0513 00:45:06.431111 1599 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused May 13 00:45:06.431238 kubelet[1599]: E0513 00:45:06.431186 1599 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:06.433490 kubelet[1599]: I0513 00:45:06.433455 1599 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 00:45:06.433490 kubelet[1599]: I0513 00:45:06.433488 1599 server.go:1287] "Started kubelet" May 13 00:45:06.436910 kubelet[1599]: W0513 00:45:06.436872 1599 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused May 13 00:45:06.436966 kubelet[1599]: E0513 00:45:06.436910 1599 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.89:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:06.437011 kubelet[1599]: I0513 00:45:06.436948 1599 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:45:06.437816 kubelet[1599]: I0513 00:45:06.437784 1599 server.go:490] "Adding debug handlers to kubelet server" May 13 00:45:06.448446 kubelet[1599]: I0513 00:45:06.448393 1599 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:45:06.448830 kubelet[1599]: I0513 00:45:06.448801 1599 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:45:06.449991 kubelet[1599]: E0513 00:45:06.449967 1599 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:45:06.454000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:06.454000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:45:06.454000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c7cba0 a1=c000d20300 a2=c000c7cb70 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.454000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:45:06.454000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:06.454000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:45:06.454000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004897c0 a1=c000d20318 a2=c000c7cc30 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.454000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:45:06.455277 kubelet[1599]: I0513 00:45:06.454934 1599 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:45:06.455277 kubelet[1599]: I0513 00:45:06.454963 1599 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 00:45:06.455277 kubelet[1599]: I0513 00:45:06.455010 1599 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:45:06.455277 kubelet[1599]: I0513 00:45:06.455129 1599 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 00:45:06.455277 kubelet[1599]: I0513 00:45:06.455249 1599 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:45:06.466969 kubelet[1599]: E0513 00:45:06.466935 1599 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:45:06.467701 kubelet[1599]: E0513 00:45:06.467680 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="200ms" May 13 00:45:06.468458 kubelet[1599]: I0513 00:45:06.468428 1599 reconciler.go:26] "Reconciler: start to sync state" May 13 00:45:06.468756 kubelet[1599]: I0513 00:45:06.468733 1599 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:45:06.469276 kubelet[1599]: E0513 00:45:06.468251 1599 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.89:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.89:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eef8fd114725c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:45:06.433471068 +0000 UTC m=+0.572811723,LastTimestamp:2025-05-13 00:45:06.433471068 +0000 UTC m=+0.572811723,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:45:06.469385 kubelet[1599]: W0513 00:45:06.469339 1599 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused May 13 00:45:06.469422 kubelet[1599]: E0513 00:45:06.469405 1599 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:06.469477 kubelet[1599]: I0513 00:45:06.469450 1599 factory.go:221] Registration of the systemd container factory successfully May 13 00:45:06.469000 audit[1612]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:06.469000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff106455d0 a2=0 a3=7fff106455bc items=0 ppid=1599 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:45:06.469934 kubelet[1599]: I0513 00:45:06.469916 1599 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:45:06.469000 audit[1613]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:06.469000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd8567250 a2=0 a3=7fffd856723c items=0 ppid=1599 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:45:06.471489 kubelet[1599]: I0513 00:45:06.471470 1599 factory.go:221] Registration of the containerd container factory successfully May 13 00:45:06.475000 audit[1617]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:06.475000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8a23b960 a2=0 a3=7ffc8a23b94c items=0 ppid=1599 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:45:06.477000 audit[1619]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:06.477000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe4b6d2370 a2=0 a3=7ffe4b6d235c items=0 ppid=1599 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:45:06.482977 kubelet[1599]: I0513 00:45:06.482946 1599 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 00:45:06.482977 kubelet[1599]: I0513 00:45:06.482965 1599 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 00:45:06.483120 kubelet[1599]: I0513 00:45:06.482986 1599 state_mem.go:36] "Initialized new in-memory state store" May 13 00:45:06.484000 audit[1624]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:06.484000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc3a4b4fb0 a2=0 a3=7ffc3a4b4f9c items=0 ppid=1599 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:45:06.485352 kubelet[1599]: I0513 00:45:06.485292 1599 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:45:06.485000 audit[1626]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:06.485000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdadc7a4e0 a2=0 a3=7ffdadc7a4cc items=0 ppid=1599 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:45:06.486000 audit[1628]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:06.486000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec2e4b570 a2=0 a3=7ffec2e4b55c items=0 ppid=1599 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:45:06.486000 audit[1625]: NETFILTER_CFG table=mangle:33 family=10 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:06.486000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff3fb84900 a2=0 a3=7fff3fb848ec items=0 ppid=1599 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:45:06.487201 kubelet[1599]: I0513 00:45:06.487073 1599 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:45:06.487201 kubelet[1599]: I0513 00:45:06.487091 1599 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 00:45:06.487201 kubelet[1599]: I0513 00:45:06.487116 1599 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 00:45:06.487201 kubelet[1599]: I0513 00:45:06.487125 1599 kubelet.go:2388] "Starting kubelet main sync loop" May 13 00:45:06.487201 kubelet[1599]: E0513 00:45:06.487172 1599 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:45:06.487000 audit[1629]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:06.487000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1edf7500 a2=0 a3=7ffd1edf74ec items=0 ppid=1599 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:45:06.488122 kubelet[1599]: W0513 00:45:06.488077 1599 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused May 13 00:45:06.488180 kubelet[1599]: E0513 00:45:06.488130 1599 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:06.488000 audit[1630]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:06.488000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4dd77ad0 a2=0 a3=7ffe4dd77abc items=0 ppid=1599 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:45:06.489000 audit[1631]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:06.489000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd43558650 a2=0 a3=7ffd4355863c items=0 ppid=1599 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:45:06.489000 audit[1632]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:06.489000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0ef91ac0 a2=0 a3=7ffd0ef91aac items=0 ppid=1599 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:06.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:45:06.567590 kubelet[1599]: E0513 00:45:06.567527 1599 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:45:06.587956 kubelet[1599]: E0513 00:45:06.587900 1599 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:45:06.668352 kubelet[1599]: E0513 00:45:06.668219 1599 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:45:06.668627 kubelet[1599]: E0513 00:45:06.668586 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="400ms" May 13 00:45:06.769024 kubelet[1599]: E0513 00:45:06.768971 1599 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:45:06.788200 kubelet[1599]: E0513 00:45:06.788154 1599 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:45:06.869657 kubelet[1599]: E0513 00:45:06.869606 1599 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:45:06.956717 kubelet[1599]: I0513 00:45:06.956568 1599 policy_none.go:49] "None policy: Start" May 13 00:45:06.956717 kubelet[1599]: I0513 00:45:06.956603 1599 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 00:45:06.956717 kubelet[1599]: I0513 00:45:06.956616 1599 state_mem.go:35] "Initializing new in-memory state store" May 13 00:45:06.970072 kubelet[1599]: E0513 00:45:06.970025 1599 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:45:06.988652 systemd[1]: Created slice kubepods.slice. May 13 00:45:06.992729 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:45:06.995160 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:45:07.001069 kubelet[1599]: I0513 00:45:07.001040 1599 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:45:07.000000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:07.000000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:45:07.000000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007aaf60 a1=c00065ae40 a2=c0007aaf00 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:07.000000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:45:07.001330 kubelet[1599]: I0513 00:45:07.001123 1599 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:45:07.001330 kubelet[1599]: I0513 00:45:07.001233 1599 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:45:07.001330 kubelet[1599]: I0513 00:45:07.001244 1599 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:45:07.001488 kubelet[1599]: I0513 00:45:07.001470 1599 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:45:07.002601 kubelet[1599]: E0513 00:45:07.002562 1599 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 00:45:07.002655 kubelet[1599]: E0513 00:45:07.002625 1599 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 13 00:45:07.069342 kubelet[1599]: E0513 00:45:07.069304 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="800ms" May 13 00:45:07.103771 kubelet[1599]: I0513 00:45:07.103708 1599 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:45:07.104200 kubelet[1599]: E0513 00:45:07.104157 1599 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" May 13 00:45:07.195528 systemd[1]: Created slice kubepods-burstable-poddc3c8e433ba0f6b74241da911555441a.slice. May 13 00:45:07.205974 kubelet[1599]: E0513 00:45:07.205933 1599 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:45:07.207589 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 13 00:45:07.210054 kubelet[1599]: E0513 00:45:07.210024 1599 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:45:07.215807 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 13 00:45:07.217226 kubelet[1599]: E0513 00:45:07.217192 1599 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:45:07.270775 kubelet[1599]: I0513 00:45:07.270721 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dc3c8e433ba0f6b74241da911555441a-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"dc3c8e433ba0f6b74241da911555441a\") " pod="kube-system/kube-apiserver-localhost" May 13 00:45:07.270775 kubelet[1599]: I0513 00:45:07.270765 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dc3c8e433ba0f6b74241da911555441a-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"dc3c8e433ba0f6b74241da911555441a\") " pod="kube-system/kube-apiserver-localhost" May 13 00:45:07.270967 kubelet[1599]: I0513 00:45:07.270800 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:07.270967 kubelet[1599]: I0513 00:45:07.270863 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:07.270967 kubelet[1599]: I0513 00:45:07.270909 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:07.270967 kubelet[1599]: I0513 00:45:07.270942 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:07.271129 kubelet[1599]: I0513 00:45:07.270969 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 13 00:45:07.271129 kubelet[1599]: I0513 00:45:07.270990 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dc3c8e433ba0f6b74241da911555441a-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"dc3c8e433ba0f6b74241da911555441a\") " pod="kube-system/kube-apiserver-localhost" May 13 00:45:07.271129 kubelet[1599]: I0513 00:45:07.271012 1599 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:07.306212 kubelet[1599]: I0513 00:45:07.306166 1599 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:45:07.306685 kubelet[1599]: E0513 00:45:07.306648 1599 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" May 13 00:45:07.306883 kubelet[1599]: W0513 00:45:07.306836 1599 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused May 13 00:45:07.306920 kubelet[1599]: E0513 00:45:07.306894 1599 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.89:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:07.506841 kubelet[1599]: E0513 00:45:07.506674 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:07.507622 env[1198]: time="2025-05-13T00:45:07.507475735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:dc3c8e433ba0f6b74241da911555441a,Namespace:kube-system,Attempt:0,}" May 13 00:45:07.511046 kubelet[1599]: E0513 00:45:07.510866 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:07.511575 env[1198]: time="2025-05-13T00:45:07.511498557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 13 00:45:07.517785 kubelet[1599]: E0513 00:45:07.517756 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:07.518397 env[1198]: time="2025-05-13T00:45:07.518310157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 13 00:45:07.617511 kubelet[1599]: W0513 00:45:07.617463 1599 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused May 13 00:45:07.617511 kubelet[1599]: E0513 00:45:07.617518 1599 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:07.708448 kubelet[1599]: I0513 00:45:07.708403 1599 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:45:07.708817 kubelet[1599]: E0513 00:45:07.708770 1599 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" May 13 00:45:07.744437 kubelet[1599]: W0513 00:45:07.744339 1599 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused May 13 00:45:07.744564 kubelet[1599]: E0513 00:45:07.744443 1599 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:07.869969 kubelet[1599]: E0513 00:45:07.869926 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="1.6s" May 13 00:45:07.998640 kubelet[1599]: W0513 00:45:07.998587 1599 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused May 13 00:45:07.998640 kubelet[1599]: E0513 00:45:07.998640 1599 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:08.309847 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3192059296.mount: Deactivated successfully. May 13 00:45:08.318021 env[1198]: time="2025-05-13T00:45:08.317925277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.319411 env[1198]: time="2025-05-13T00:45:08.319354410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.322765 env[1198]: time="2025-05-13T00:45:08.322711108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.323872 env[1198]: time="2025-05-13T00:45:08.323813694Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.327013 env[1198]: time="2025-05-13T00:45:08.326954400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.328720 env[1198]: time="2025-05-13T00:45:08.328663861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.330436 env[1198]: time="2025-05-13T00:45:08.330386031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.331866 env[1198]: time="2025-05-13T00:45:08.331828103Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.334189 env[1198]: time="2025-05-13T00:45:08.334106383Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.336320 env[1198]: time="2025-05-13T00:45:08.336281357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.338697 env[1198]: time="2025-05-13T00:45:08.338647799Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.349954 env[1198]: time="2025-05-13T00:45:08.349854251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:08.397317 env[1198]: time="2025-05-13T00:45:08.397209833Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:08.397317 env[1198]: time="2025-05-13T00:45:08.397260600Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:08.397317 env[1198]: time="2025-05-13T00:45:08.397297465Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:08.397667 env[1198]: time="2025-05-13T00:45:08.397542049Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2648d6d808d434da7a9a823a3c6c4991b16a610847fc71635a48aef3bdaec8f7 pid=1643 runtime=io.containerd.runc.v2 May 13 00:45:08.406286 env[1198]: time="2025-05-13T00:45:08.406187430Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:08.406523 env[1198]: time="2025-05-13T00:45:08.406491884Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:08.406658 env[1198]: time="2025-05-13T00:45:08.406627196Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:08.406964 env[1198]: time="2025-05-13T00:45:08.406926443Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5421684760f64858ced2e9b17af9bf93ce359b113e3902df6c33c4ad90345d5 pid=1650 runtime=io.containerd.runc.v2 May 13 00:45:08.411114 env[1198]: time="2025-05-13T00:45:08.411005940Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:08.411114 env[1198]: time="2025-05-13T00:45:08.411083095Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:08.411292 env[1198]: time="2025-05-13T00:45:08.411098578Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:08.411394 env[1198]: time="2025-05-13T00:45:08.411313148Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/29d80b55a0032bbeb79913e3e320d9c9a986dc60591bbe11865e5b2f7f63944c pid=1673 runtime=io.containerd.runc.v2 May 13 00:45:08.416204 systemd[1]: Started cri-containerd-2648d6d808d434da7a9a823a3c6c4991b16a610847fc71635a48aef3bdaec8f7.scope. May 13 00:45:08.455868 kubelet[1599]: E0513 00:45:08.455770 1599 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.89:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.89:6443: connect: connection refused" logger="UnhandledError" May 13 00:45:08.473845 kubelet[1599]: E0513 00:45:08.473767 1599 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.89:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.89:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eef8fd114725c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:45:06.433471068 +0000 UTC m=+0.572811723,LastTimestamp:2025-05-13 00:45:06.433471068 +0000 UTC m=+0.572811723,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:45:08.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.511053 kubelet[1599]: I0513 00:45:08.511023 1599 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:45:08.511601 kubelet[1599]: E0513 00:45:08.511577 1599 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" May 13 00:45:08.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.540000 audit: BPF prog-id=58 op=LOAD May 13 00:45:08.540000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.540000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1643 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343864366438303864343334646137613961383233613363366334 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1643 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343864366438303864343334646137613961383233613363366334 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit: BPF prog-id=59 op=LOAD May 13 00:45:08.541000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001f9d90 items=0 ppid=1643 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343864366438303864343334646137613961383233613363366334 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit: BPF prog-id=60 op=LOAD May 13 00:45:08.541000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001f9dd8 items=0 ppid=1643 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343864366438303864343334646137613961383233613363366334 May 13 00:45:08.541000 audit: BPF prog-id=60 op=UNLOAD May 13 00:45:08.541000 audit: BPF prog-id=59 op=UNLOAD May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.541000 audit: BPF prog-id=61 op=LOAD May 13 00:45:08.541000 audit[1663]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ec1e8 items=0 ppid=1643 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343864366438303864343334646137613961383233613363366334 May 13 00:45:08.552507 systemd[1]: Started cri-containerd-29d80b55a0032bbeb79913e3e320d9c9a986dc60591bbe11865e5b2f7f63944c.scope. May 13 00:45:08.558171 systemd[1]: Started cri-containerd-f5421684760f64858ced2e9b17af9bf93ce359b113e3902df6c33c4ad90345d5.scope. May 13 00:45:08.615715 env[1198]: time="2025-05-13T00:45:08.615654500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:dc3c8e433ba0f6b74241da911555441a,Namespace:kube-system,Attempt:0,} returns sandbox id \"2648d6d808d434da7a9a823a3c6c4991b16a610847fc71635a48aef3bdaec8f7\"" May 13 00:45:08.616805 kubelet[1599]: E0513 00:45:08.616769 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:08.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.618000 audit: BPF prog-id=62 op=LOAD May 13 00:45:08.619697 env[1198]: time="2025-05-13T00:45:08.618685653Z" level=info msg="CreateContainer within sandbox \"2648d6d808d434da7a9a823a3c6c4991b16a610847fc71635a48aef3bdaec8f7\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 00:45:08.623000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643830623535613030333262626562373939313365336533323064 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643830623535613030333262626562373939313365336533323064 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.623000 audit: BPF prog-id=63 op=LOAD May 13 00:45:08.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit: BPF prog-id=64 op=LOAD May 13 00:45:08.623000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003f42b0 items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643830623535613030333262626562373939313365336533323064 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1650 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343231363834373630663634383538636564326539623137616639 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1650 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343231363834373630663634383538636564326539623137616639 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit: BPF prog-id=65 op=LOAD May 13 00:45:08.625000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003512e0 items=0 ppid=1650 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343231363834373630663634383538636564326539623137616639 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit: BPF prog-id=66 op=LOAD May 13 00:45:08.625000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000351328 items=0 ppid=1650 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343231363834373630663634383538636564326539623137616639 May 13 00:45:08.625000 audit: BPF prog-id=66 op=UNLOAD May 13 00:45:08.625000 audit: BPF prog-id=65 op=UNLOAD May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.625000 audit: BPF prog-id=67 op=LOAD May 13 00:45:08.625000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000351738 items=0 ppid=1650 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343231363834373630663634383538636564326539623137616639 May 13 00:45:08.624000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.624000 audit: BPF prog-id=68 op=LOAD May 13 00:45:08.624000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003f42f8 items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643830623535613030333262626562373939313365336533323064 May 13 00:45:08.627000 audit: BPF prog-id=68 op=UNLOAD May 13 00:45:08.627000 audit: BPF prog-id=63 op=UNLOAD May 13 00:45:08.627000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { perfmon } for pid=1694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit[1694]: AVC avc: denied { bpf } for pid=1694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.627000 audit: BPF prog-id=69 op=LOAD May 13 00:45:08.627000 audit[1694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f4708 items=0 ppid=1673 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643830623535613030333262626562373939313365336533323064 May 13 00:45:08.636638 env[1198]: time="2025-05-13T00:45:08.636598582Z" level=info msg="CreateContainer within sandbox \"2648d6d808d434da7a9a823a3c6c4991b16a610847fc71635a48aef3bdaec8f7\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ebcc4d607de083e04f8aac8e242b11271d6d364811cdbe9ae84ef5e1123174b7\"" May 13 00:45:08.637498 env[1198]: time="2025-05-13T00:45:08.637462711Z" level=info msg="StartContainer for \"ebcc4d607de083e04f8aac8e242b11271d6d364811cdbe9ae84ef5e1123174b7\"" May 13 00:45:08.650428 env[1198]: time="2025-05-13T00:45:08.650395299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"f5421684760f64858ced2e9b17af9bf93ce359b113e3902df6c33c4ad90345d5\"" May 13 00:45:08.651159 kubelet[1599]: E0513 00:45:08.650980 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:08.653096 env[1198]: time="2025-05-13T00:45:08.653075107Z" level=info msg="CreateContainer within sandbox \"f5421684760f64858ced2e9b17af9bf93ce359b113e3902df6c33c4ad90345d5\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 00:45:08.654867 env[1198]: time="2025-05-13T00:45:08.654845960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"29d80b55a0032bbeb79913e3e320d9c9a986dc60591bbe11865e5b2f7f63944c\"" May 13 00:45:08.655421 kubelet[1599]: E0513 00:45:08.655305 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:08.656464 env[1198]: time="2025-05-13T00:45:08.656443874Z" level=info msg="CreateContainer within sandbox \"29d80b55a0032bbeb79913e3e320d9c9a986dc60591bbe11865e5b2f7f63944c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 00:45:08.658557 systemd[1]: Started cri-containerd-ebcc4d607de083e04f8aac8e242b11271d6d364811cdbe9ae84ef5e1123174b7.scope. May 13 00:45:08.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit: BPF prog-id=70 op=LOAD May 13 00:45:08.674000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1643 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636334643630376465303833653034663861616338653234326231 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1643 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636334643630376465303833653034663861616338653234326231 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.674000 audit: BPF prog-id=71 op=LOAD May 13 00:45:08.674000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000259bb0 items=0 ppid=1643 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636334643630376465303833653034663861616338653234326231 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit: BPF prog-id=72 op=LOAD May 13 00:45:08.675000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000259bf8 items=0 ppid=1643 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636334643630376465303833653034663861616338653234326231 May 13 00:45:08.675000 audit: BPF prog-id=72 op=UNLOAD May 13 00:45:08.675000 audit: BPF prog-id=71 op=UNLOAD May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.675000 audit: BPF prog-id=73 op=LOAD May 13 00:45:08.675000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c0008 items=0 ppid=1643 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636334643630376465303833653034663861616338653234326231 May 13 00:45:08.677149 env[1198]: time="2025-05-13T00:45:08.676134696Z" level=info msg="CreateContainer within sandbox \"29d80b55a0032bbeb79913e3e320d9c9a986dc60591bbe11865e5b2f7f63944c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c2b9ec90f4e93ea13c3b9b9d81b28c52e4ff948438c746afcab6c1b94fa99265\"" May 13 00:45:08.677149 env[1198]: time="2025-05-13T00:45:08.676698868Z" level=info msg="StartContainer for \"c2b9ec90f4e93ea13c3b9b9d81b28c52e4ff948438c746afcab6c1b94fa99265\"" May 13 00:45:08.681767 env[1198]: time="2025-05-13T00:45:08.681727953Z" level=info msg="CreateContainer within sandbox \"f5421684760f64858ced2e9b17af9bf93ce359b113e3902df6c33c4ad90345d5\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"2a0d3d931a3e87234a21c7c5eb0e8b4318a3e9411513926d226b4ddfc9f648a5\"" May 13 00:45:08.682382 env[1198]: time="2025-05-13T00:45:08.682325033Z" level=info msg="StartContainer for \"2a0d3d931a3e87234a21c7c5eb0e8b4318a3e9411513926d226b4ddfc9f648a5\"" May 13 00:45:08.692407 systemd[1]: Started cri-containerd-c2b9ec90f4e93ea13c3b9b9d81b28c52e4ff948438c746afcab6c1b94fa99265.scope. May 13 00:45:08.699025 systemd[1]: Started cri-containerd-2a0d3d931a3e87234a21c7c5eb0e8b4318a3e9411513926d226b4ddfc9f648a5.scope. May 13 00:45:08.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.714000 audit: BPF prog-id=74 op=LOAD May 13 00:45:08.715000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.715000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1673 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623965633930663465393365613133633362396239643831623238 May 13 00:45:08.716158 env[1198]: time="2025-05-13T00:45:08.716089556Z" level=info msg="StartContainer for \"ebcc4d607de083e04f8aac8e242b11271d6d364811cdbe9ae84ef5e1123174b7\" returns successfully" May 13 00:45:08.715000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.715000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1673 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623965633930663465393365613133633362396239643831623238 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.716000 audit: BPF prog-id=75 op=LOAD May 13 00:45:08.716000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000219920 items=0 ppid=1673 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623965633930663465393365613133633362396239643831623238 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit: BPF prog-id=76 op=LOAD May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1650 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261306433643933316133653837323334613231633763356562306538 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1650 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261306433643933316133653837323334613231633763356562306538 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit: BPF prog-id=77 op=LOAD May 13 00:45:08.718000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00036c010 items=0 ppid=1650 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261306433643933316133653837323334613231633763356562306538 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit: BPF prog-id=78 op=LOAD May 13 00:45:08.718000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00036c058 items=0 ppid=1650 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261306433643933316133653837323334613231633763356562306538 May 13 00:45:08.718000 audit: BPF prog-id=78 op=UNLOAD May 13 00:45:08.718000 audit: BPF prog-id=77 op=UNLOAD May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.718000 audit: BPF prog-id=79 op=LOAD May 13 00:45:08.718000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00036c468 items=0 ppid=1650 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261306433643933316133653837323334613231633763356562306538 May 13 00:45:08.717000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.717000 audit: BPF prog-id=80 op=LOAD May 13 00:45:08.717000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000219968 items=0 ppid=1673 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623965633930663465393365613133633362396239643831623238 May 13 00:45:08.720000 audit: BPF prog-id=80 op=UNLOAD May 13 00:45:08.720000 audit: BPF prog-id=75 op=UNLOAD May 13 00:45:08.720000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:08.720000 audit: BPF prog-id=81 op=LOAD May 13 00:45:08.720000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000219d78 items=0 ppid=1673 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:08.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332623965633930663465393365613133633362396239643831623238 May 13 00:45:08.746669 env[1198]: time="2025-05-13T00:45:08.746622836Z" level=info msg="StartContainer for \"2a0d3d931a3e87234a21c7c5eb0e8b4318a3e9411513926d226b4ddfc9f648a5\" returns successfully" May 13 00:45:08.756828 env[1198]: time="2025-05-13T00:45:08.756791048Z" level=info msg="StartContainer for \"c2b9ec90f4e93ea13c3b9b9d81b28c52e4ff948438c746afcab6c1b94fa99265\" returns successfully" May 13 00:45:09.406000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:09.406000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000dc2cc0 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:09.406000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:45:09.407000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:09.407000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001123e0 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:09.407000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:45:09.494842 kubelet[1599]: E0513 00:45:09.494601 1599 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:45:09.494842 kubelet[1599]: E0513 00:45:09.494743 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:09.496470 kubelet[1599]: E0513 00:45:09.496442 1599 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:45:09.496626 kubelet[1599]: E0513 00:45:09.496524 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:09.498249 kubelet[1599]: E0513 00:45:09.498215 1599 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 13 00:45:09.498357 kubelet[1599]: E0513 00:45:09.498340 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:09.702000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:09.702000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c004482930 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:45:09.702000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:45:09.708000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:09.708000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:09.708000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c005cd3b90 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:45:09.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:45:09.708000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004482a80 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:45:09.708000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:09.708000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c002e219a0 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:45:09.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:45:09.708000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:45:09.712000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:09.712000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0053ed4a0 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:45:09.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:45:09.712000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:09.712000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004872c30 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:45:09.712000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:45:09.760416 kubelet[1599]: E0513 00:45:09.760351 1599 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 13 00:45:10.113341 kubelet[1599]: I0513 00:45:10.113321 1599 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:45:10.134975 kubelet[1599]: I0513 00:45:10.134953 1599 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 13 00:45:10.135062 kubelet[1599]: E0513 00:45:10.134982 1599 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 13 00:45:10.168465 kubelet[1599]: I0513 00:45:10.168410 1599 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 13 00:45:10.172650 kubelet[1599]: E0513 00:45:10.172615 1599 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 13 00:45:10.172650 kubelet[1599]: I0513 00:45:10.172654 1599 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:45:10.174092 kubelet[1599]: E0513 00:45:10.174066 1599 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 13 00:45:10.174092 kubelet[1599]: I0513 00:45:10.174091 1599 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:45:10.175839 kubelet[1599]: E0513 00:45:10.175803 1599 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 13 00:45:10.398497 kubelet[1599]: I0513 00:45:10.398337 1599 apiserver.go:52] "Watching apiserver" May 13 00:45:10.468920 kubelet[1599]: I0513 00:45:10.468853 1599 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:45:10.498518 kubelet[1599]: I0513 00:45:10.498485 1599 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:45:10.498866 kubelet[1599]: I0513 00:45:10.498557 1599 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:45:10.500793 kubelet[1599]: E0513 00:45:10.500742 1599 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 13 00:45:10.500793 kubelet[1599]: E0513 00:45:10.500744 1599 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 13 00:45:10.500909 kubelet[1599]: E0513 00:45:10.500894 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:10.500950 kubelet[1599]: E0513 00:45:10.500930 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:11.799269 systemd[1]: Reloading. May 13 00:45:11.865337 /usr/lib/systemd/system-generators/torcx-generator[1900]: time="2025-05-13T00:45:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:45:11.865381 /usr/lib/systemd/system-generators/torcx-generator[1900]: time="2025-05-13T00:45:11Z" level=info msg="torcx already run" May 13 00:45:11.925049 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:45:11.925065 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:45:11.941571 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:45:12.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.009428 kernel: kauditd_printk_skb: 579 callbacks suppressed May 13 00:45:12.009488 kernel: audit: type=1400 audit(1747097112.007:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.015172 kernel: audit: type=1400 audit(1747097112.007:556): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.015209 kernel: audit: type=1400 audit(1747097112.007:557): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.021052 kernel: audit: type=1400 audit(1747097112.007:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.021105 kernel: audit: type=1400 audit(1747097112.007:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.023980 kernel: audit: type=1400 audit(1747097112.007:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026894 kernel: audit: type=1400 audit(1747097112.007:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.029835 kernel: audit: type=1400 audit(1747097112.007:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.032731 kernel: audit: type=1400 audit(1747097112.007:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035584 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 00:45:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.010000 audit: BPF prog-id=82 op=LOAD May 13 00:45:12.010000 audit: BPF prog-id=43 op=UNLOAD May 13 00:45:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.013000 audit: BPF prog-id=83 op=LOAD May 13 00:45:12.013000 audit: BPF prog-id=70 op=UNLOAD May 13 00:45:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit: BPF prog-id=84 op=LOAD May 13 00:45:12.016000 audit: BPF prog-id=44 op=UNLOAD May 13 00:45:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit: BPF prog-id=85 op=LOAD May 13 00:45:12.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.025000 audit: BPF prog-id=86 op=LOAD May 13 00:45:12.025000 audit: BPF prog-id=45 op=UNLOAD May 13 00:45:12.025000 audit: BPF prog-id=46 op=UNLOAD May 13 00:45:12.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.031000 audit: BPF prog-id=87 op=LOAD May 13 00:45:12.031000 audit: BPF prog-id=47 op=UNLOAD May 13 00:45:12.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit: BPF prog-id=88 op=LOAD May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit: BPF prog-id=89 op=LOAD May 13 00:45:12.035000 audit: BPF prog-id=48 op=UNLOAD May 13 00:45:12.035000 audit: BPF prog-id=49 op=UNLOAD May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.036000 audit: BPF prog-id=90 op=LOAD May 13 00:45:12.036000 audit: BPF prog-id=74 op=UNLOAD May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit: BPF prog-id=91 op=LOAD May 13 00:45:12.037000 audit: BPF prog-id=50 op=UNLOAD May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit: BPF prog-id=92 op=LOAD May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit: BPF prog-id=93 op=LOAD May 13 00:45:12.038000 audit: BPF prog-id=51 op=UNLOAD May 13 00:45:12.038000 audit: BPF prog-id=52 op=UNLOAD May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit: BPF prog-id=94 op=LOAD May 13 00:45:12.038000 audit: BPF prog-id=53 op=UNLOAD May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit: BPF prog-id=95 op=LOAD May 13 00:45:12.039000 audit: BPF prog-id=54 op=UNLOAD May 13 00:45:12.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.039000 audit: BPF prog-id=96 op=LOAD May 13 00:45:12.039000 audit: BPF prog-id=58 op=UNLOAD May 13 00:45:12.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.040000 audit: BPF prog-id=97 op=LOAD May 13 00:45:12.040000 audit: BPF prog-id=62 op=UNLOAD May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit: BPF prog-id=98 op=LOAD May 13 00:45:12.041000 audit: BPF prog-id=64 op=UNLOAD May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.041000 audit: BPF prog-id=99 op=LOAD May 13 00:45:12.041000 audit: BPF prog-id=76 op=UNLOAD May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit: BPF prog-id=100 op=LOAD May 13 00:45:12.042000 audit: BPF prog-id=55 op=UNLOAD May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit: BPF prog-id=101 op=LOAD May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.042000 audit: BPF prog-id=102 op=LOAD May 13 00:45:12.042000 audit: BPF prog-id=56 op=UNLOAD May 13 00:45:12.042000 audit: BPF prog-id=57 op=UNLOAD May 13 00:45:12.053626 systemd[1]: Stopping kubelet.service... May 13 00:45:12.076716 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:45:12.076924 systemd[1]: Stopped kubelet.service. May 13 00:45:12.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:12.076983 systemd[1]: kubelet.service: Consumed 1.019s CPU time. May 13 00:45:12.078633 systemd[1]: Starting kubelet.service... May 13 00:45:12.159085 systemd[1]: Started kubelet.service. May 13 00:45:12.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:12.206121 kubelet[1943]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:45:12.206121 kubelet[1943]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 00:45:12.206121 kubelet[1943]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:45:12.206121 kubelet[1943]: I0513 00:45:12.205643 1943 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:45:12.212794 kubelet[1943]: I0513 00:45:12.212763 1943 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 00:45:12.212794 kubelet[1943]: I0513 00:45:12.212785 1943 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:45:12.213026 kubelet[1943]: I0513 00:45:12.213003 1943 server.go:954] "Client rotation is on, will bootstrap in background" May 13 00:45:12.214073 kubelet[1943]: I0513 00:45:12.214057 1943 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 00:45:12.216636 kubelet[1943]: I0513 00:45:12.216609 1943 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:45:12.219360 kubelet[1943]: E0513 00:45:12.219329 1943 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 00:45:12.219360 kubelet[1943]: I0513 00:45:12.219375 1943 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 00:45:12.224092 kubelet[1943]: I0513 00:45:12.224059 1943 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:45:12.224310 kubelet[1943]: I0513 00:45:12.224284 1943 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:45:12.224485 kubelet[1943]: I0513 00:45:12.224310 1943 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 00:45:12.224485 kubelet[1943]: I0513 00:45:12.224485 1943 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:45:12.224612 kubelet[1943]: I0513 00:45:12.224494 1943 container_manager_linux.go:304] "Creating device plugin manager" May 13 00:45:12.224612 kubelet[1943]: I0513 00:45:12.224531 1943 state_mem.go:36] "Initialized new in-memory state store" May 13 00:45:12.224669 kubelet[1943]: I0513 00:45:12.224658 1943 kubelet.go:446] "Attempting to sync node with API server" May 13 00:45:12.224694 kubelet[1943]: I0513 00:45:12.224671 1943 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:45:12.224694 kubelet[1943]: I0513 00:45:12.224687 1943 kubelet.go:352] "Adding apiserver pod source" May 13 00:45:12.224734 kubelet[1943]: I0513 00:45:12.224697 1943 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:45:12.225530 kubelet[1943]: I0513 00:45:12.225514 1943 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:45:12.225842 kubelet[1943]: I0513 00:45:12.225828 1943 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:45:12.226195 kubelet[1943]: I0513 00:45:12.226180 1943 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 00:45:12.226273 kubelet[1943]: I0513 00:45:12.226205 1943 server.go:1287] "Started kubelet" May 13 00:45:12.226000 audit[1943]: AVC avc: denied { mac_admin } for pid=1943 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.226000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:45:12.226000 audit[1943]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000781800 a1=c000740ee8 a2=c0007817d0 a3=25 items=0 ppid=1 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:12.226000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:45:12.228163 kubelet[1943]: I0513 00:45:12.228138 1943 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:45:12.226000 audit[1943]: AVC avc: denied { mac_admin } for pid=1943 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.226000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:45:12.226000 audit[1943]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000501680 a1=c000740f00 a2=c000781890 a3=25 items=0 ppid=1 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:12.226000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:45:12.228537 kubelet[1943]: I0513 00:45:12.228520 1943 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 00:45:12.228630 kubelet[1943]: I0513 00:45:12.228616 1943 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:45:12.229608 kubelet[1943]: E0513 00:45:12.229590 1943 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:45:12.229761 kubelet[1943]: I0513 00:45:12.229744 1943 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 00:45:12.229824 kubelet[1943]: I0513 00:45:12.229807 1943 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:45:12.229909 kubelet[1943]: I0513 00:45:12.229894 1943 reconciler.go:26] "Reconciler: start to sync state" May 13 00:45:12.230322 kubelet[1943]: I0513 00:45:12.230305 1943 factory.go:221] Registration of the systemd container factory successfully May 13 00:45:12.230405 kubelet[1943]: I0513 00:45:12.230384 1943 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:45:12.230943 kubelet[1943]: I0513 00:45:12.230898 1943 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:45:12.231988 kubelet[1943]: I0513 00:45:12.231968 1943 server.go:490] "Adding debug handlers to kubelet server" May 13 00:45:12.234327 kubelet[1943]: I0513 00:45:12.232881 1943 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:45:12.234327 kubelet[1943]: I0513 00:45:12.233082 1943 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:45:12.234327 kubelet[1943]: I0513 00:45:12.233272 1943 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 00:45:12.240331 kubelet[1943]: E0513 00:45:12.236523 1943 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 13 00:45:12.240331 kubelet[1943]: I0513 00:45:12.239015 1943 factory.go:221] Registration of the containerd container factory successfully May 13 00:45:12.254740 kubelet[1943]: I0513 00:45:12.254673 1943 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:45:12.255840 kubelet[1943]: I0513 00:45:12.255814 1943 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:45:12.255840 kubelet[1943]: I0513 00:45:12.255838 1943 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 00:45:12.255923 kubelet[1943]: I0513 00:45:12.255861 1943 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 00:45:12.255923 kubelet[1943]: I0513 00:45:12.255869 1943 kubelet.go:2388] "Starting kubelet main sync loop" May 13 00:45:12.255923 kubelet[1943]: E0513 00:45:12.255906 1943 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:45:12.271261 kubelet[1943]: I0513 00:45:12.271236 1943 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 00:45:12.271261 kubelet[1943]: I0513 00:45:12.271250 1943 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 00:45:12.271261 kubelet[1943]: I0513 00:45:12.271267 1943 state_mem.go:36] "Initialized new in-memory state store" May 13 00:45:12.271449 kubelet[1943]: I0513 00:45:12.271395 1943 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 00:45:12.271449 kubelet[1943]: I0513 00:45:12.271406 1943 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 00:45:12.271449 kubelet[1943]: I0513 00:45:12.271422 1943 policy_none.go:49] "None policy: Start" May 13 00:45:12.271449 kubelet[1943]: I0513 00:45:12.271430 1943 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 00:45:12.271449 kubelet[1943]: I0513 00:45:12.271439 1943 state_mem.go:35] "Initializing new in-memory state store" May 13 00:45:12.271553 kubelet[1943]: I0513 00:45:12.271519 1943 state_mem.go:75] "Updated machine memory state" May 13 00:45:12.274734 kubelet[1943]: I0513 00:45:12.274711 1943 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:45:12.273000 audit[1943]: AVC avc: denied { mac_admin } for pid=1943 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:12.273000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:45:12.273000 audit[1943]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7ecf0 a1=c0010e66a8 a2=c000b7ecc0 a3=25 items=0 ppid=1 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:12.273000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:45:12.275135 kubelet[1943]: I0513 00:45:12.274839 1943 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:45:12.275135 kubelet[1943]: I0513 00:45:12.274963 1943 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 00:45:12.275135 kubelet[1943]: I0513 00:45:12.274974 1943 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:45:12.275226 kubelet[1943]: I0513 00:45:12.275156 1943 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:45:12.275983 kubelet[1943]: E0513 00:45:12.275965 1943 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 00:45:12.357139 kubelet[1943]: I0513 00:45:12.357098 1943 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 13 00:45:12.357288 kubelet[1943]: I0513 00:45:12.357256 1943 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:45:12.357349 kubelet[1943]: I0513 00:45:12.357312 1943 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:45:12.378723 kubelet[1943]: I0513 00:45:12.378679 1943 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 13 00:45:12.384654 kubelet[1943]: I0513 00:45:12.384628 1943 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 13 00:45:12.384749 kubelet[1943]: I0513 00:45:12.384705 1943 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 13 00:45:12.431288 kubelet[1943]: I0513 00:45:12.431235 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dc3c8e433ba0f6b74241da911555441a-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"dc3c8e433ba0f6b74241da911555441a\") " pod="kube-system/kube-apiserver-localhost" May 13 00:45:12.431288 kubelet[1943]: I0513 00:45:12.431280 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:12.431288 kubelet[1943]: I0513 00:45:12.431297 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:12.431554 kubelet[1943]: I0513 00:45:12.431319 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:12.431554 kubelet[1943]: I0513 00:45:12.431334 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dc3c8e433ba0f6b74241da911555441a-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"dc3c8e433ba0f6b74241da911555441a\") " pod="kube-system/kube-apiserver-localhost" May 13 00:45:12.431554 kubelet[1943]: I0513 00:45:12.431346 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dc3c8e433ba0f6b74241da911555441a-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"dc3c8e433ba0f6b74241da911555441a\") " pod="kube-system/kube-apiserver-localhost" May 13 00:45:12.431554 kubelet[1943]: I0513 00:45:12.431386 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:12.431554 kubelet[1943]: I0513 00:45:12.431401 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:45:12.431694 kubelet[1943]: I0513 00:45:12.431453 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 13 00:45:12.662490 kubelet[1943]: E0513 00:45:12.662339 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:12.663679 kubelet[1943]: E0513 00:45:12.663552 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:12.663679 kubelet[1943]: E0513 00:45:12.663571 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:13.051000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:45:13.051000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000636000 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:13.051000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:45:13.225967 kubelet[1943]: I0513 00:45:13.225919 1943 apiserver.go:52] "Watching apiserver" May 13 00:45:13.230545 kubelet[1943]: I0513 00:45:13.230497 1943 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:45:13.264078 kubelet[1943]: I0513 00:45:13.264048 1943 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 13 00:45:13.264455 kubelet[1943]: I0513 00:45:13.264427 1943 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 13 00:45:13.264633 kubelet[1943]: I0513 00:45:13.264609 1943 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 13 00:45:13.272542 kubelet[1943]: E0513 00:45:13.271919 1943 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 13 00:45:13.272753 kubelet[1943]: E0513 00:45:13.272718 1943 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 13 00:45:13.272853 kubelet[1943]: E0513 00:45:13.272821 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:13.272910 kubelet[1943]: E0513 00:45:13.272899 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:13.273283 kubelet[1943]: E0513 00:45:13.272046 1943 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 13 00:45:13.273341 kubelet[1943]: E0513 00:45:13.273329 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:13.293679 kubelet[1943]: I0513 00:45:13.293612 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.293593596 podStartE2EDuration="1.293593596s" podCreationTimestamp="2025-05-13 00:45:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:45:13.285058029 +0000 UTC m=+1.120457426" watchObservedRunningTime="2025-05-13 00:45:13.293593596 +0000 UTC m=+1.128992983" May 13 00:45:13.301286 kubelet[1943]: I0513 00:45:13.301207 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.301189301 podStartE2EDuration="1.301189301s" podCreationTimestamp="2025-05-13 00:45:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:45:13.301068742 +0000 UTC m=+1.136468139" watchObservedRunningTime="2025-05-13 00:45:13.301189301 +0000 UTC m=+1.136588698" May 13 00:45:13.301534 kubelet[1943]: I0513 00:45:13.301313 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.301308076 podStartE2EDuration="1.301308076s" podCreationTimestamp="2025-05-13 00:45:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:45:13.293834903 +0000 UTC m=+1.129234300" watchObservedRunningTime="2025-05-13 00:45:13.301308076 +0000 UTC m=+1.136707473" May 13 00:45:14.265857 kubelet[1943]: E0513 00:45:14.265812 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:14.266263 kubelet[1943]: E0513 00:45:14.266241 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:14.266348 kubelet[1943]: E0513 00:45:14.266328 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:15.267599 kubelet[1943]: E0513 00:45:15.267557 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:17.140643 sudo[1338]: pam_unix(sudo:session): session closed for user root May 13 00:45:17.139000 audit[1338]: USER_END pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:45:17.141790 kernel: kauditd_printk_skb: 253 callbacks suppressed May 13 00:45:17.141850 kernel: audit: type=1106 audit(1747097117.139:804): pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:45:17.144740 sshd[1335]: pam_unix(sshd:session): session closed for user core May 13 00:45:17.139000 audit[1338]: CRED_DISP pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:45:17.147619 systemd[1]: sshd@6-10.0.0.89:22-10.0.0.1:48026.service: Deactivated successfully. May 13 00:45:17.148388 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:45:17.148536 systemd[1]: session-7.scope: Consumed 4.759s CPU time. May 13 00:45:17.149176 systemd-logind[1188]: Session 7 logged out. Waiting for processes to exit. May 13 00:45:17.149469 kernel: audit: type=1104 audit(1747097117.139:805): pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:45:17.149541 kernel: audit: type=1106 audit(1747097117.144:806): pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:17.144000 audit[1335]: USER_END pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:17.150058 systemd-logind[1188]: Removed session 7. May 13 00:45:17.144000 audit[1335]: CRED_DISP pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:17.157838 kernel: audit: type=1104 audit(1747097117.144:807): pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:17.157933 kernel: audit: type=1131 audit(1747097117.146:808): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:48026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:17.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:48026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:17.369000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:17.369000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000efeac0 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:17.380028 kernel: audit: type=1400 audit(1747097117.369:809): avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:17.380093 kernel: audit: type=1300 audit(1747097117.369:809): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000efeac0 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:17.380119 kernel: audit: type=1327 audit(1747097117.369:809): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:45:17.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:45:17.384323 kernel: audit: type=1400 audit(1747097117.369:810): avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:17.369000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:17.388002 kernel: audit: type=1300 audit(1747097117.369:810): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013ea560 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:17.369000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013ea560 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:17.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:45:17.369000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:17.369000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013ea720 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:17.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:45:17.370000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:45:17.370000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001124e0 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:45:17.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:45:17.701323 kubelet[1943]: I0513 00:45:17.701189 1943 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 00:45:17.701693 env[1198]: time="2025-05-13T00:45:17.701563024Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:45:17.701868 kubelet[1943]: I0513 00:45:17.701744 1943 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 00:45:18.142555 systemd[1]: Created slice kubepods-besteffort-pod1e532cd4_670f_4380_bfb0_2d5b3de102d5.slice. May 13 00:45:18.169469 kubelet[1943]: I0513 00:45:18.169404 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1e532cd4-670f-4380-bfb0-2d5b3de102d5-kube-proxy\") pod \"kube-proxy-4v888\" (UID: \"1e532cd4-670f-4380-bfb0-2d5b3de102d5\") " pod="kube-system/kube-proxy-4v888" May 13 00:45:18.169469 kubelet[1943]: I0513 00:45:18.169460 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e532cd4-670f-4380-bfb0-2d5b3de102d5-xtables-lock\") pod \"kube-proxy-4v888\" (UID: \"1e532cd4-670f-4380-bfb0-2d5b3de102d5\") " pod="kube-system/kube-proxy-4v888" May 13 00:45:18.169469 kubelet[1943]: I0513 00:45:18.169483 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e532cd4-670f-4380-bfb0-2d5b3de102d5-lib-modules\") pod \"kube-proxy-4v888\" (UID: \"1e532cd4-670f-4380-bfb0-2d5b3de102d5\") " pod="kube-system/kube-proxy-4v888" May 13 00:45:18.169765 kubelet[1943]: I0513 00:45:18.169502 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mwcwt\" (UniqueName: \"kubernetes.io/projected/1e532cd4-670f-4380-bfb0-2d5b3de102d5-kube-api-access-mwcwt\") pod \"kube-proxy-4v888\" (UID: \"1e532cd4-670f-4380-bfb0-2d5b3de102d5\") " pod="kube-system/kube-proxy-4v888" May 13 00:45:18.291575 kubelet[1943]: I0513 00:45:18.291526 1943 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 00:45:18.450517 kubelet[1943]: E0513 00:45:18.450388 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:18.451018 env[1198]: time="2025-05-13T00:45:18.450962774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4v888,Uid:1e532cd4-670f-4380-bfb0-2d5b3de102d5,Namespace:kube-system,Attempt:0,}" May 13 00:45:18.519553 env[1198]: time="2025-05-13T00:45:18.519471619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:18.519751 env[1198]: time="2025-05-13T00:45:18.519562941Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:18.519751 env[1198]: time="2025-05-13T00:45:18.519603498Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:18.520003 env[1198]: time="2025-05-13T00:45:18.519931579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8f217b747014af3819dbc48c99930f829cefca48764f2af08412c57cc7754e8 pid=2036 runtime=io.containerd.runc.v2 May 13 00:45:18.536532 systemd[1]: run-containerd-runc-k8s.io-a8f217b747014af3819dbc48c99930f829cefca48764f2af08412c57cc7754e8-runc.Djtkp0.mount: Deactivated successfully. May 13 00:45:18.539329 systemd[1]: Started cri-containerd-a8f217b747014af3819dbc48c99930f829cefca48764f2af08412c57cc7754e8.scope. May 13 00:45:18.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.547000 audit: BPF prog-id=103 op=LOAD May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2036 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663231376237343730313461663338313964626334386339393933 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2036 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663231376237343730313461663338313964626334386339393933 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit: BPF prog-id=104 op=LOAD May 13 00:45:18.548000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0003043c0 items=0 ppid=2036 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663231376237343730313461663338313964626334386339393933 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit: BPF prog-id=105 op=LOAD May 13 00:45:18.548000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000304408 items=0 ppid=2036 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663231376237343730313461663338313964626334386339393933 May 13 00:45:18.548000 audit: BPF prog-id=105 op=UNLOAD May 13 00:45:18.548000 audit: BPF prog-id=104 op=UNLOAD May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.548000 audit: BPF prog-id=106 op=LOAD May 13 00:45:18.548000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000304818 items=0 ppid=2036 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138663231376237343730313461663338313964626334386339393933 May 13 00:45:18.562272 env[1198]: time="2025-05-13T00:45:18.562241715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4v888,Uid:1e532cd4-670f-4380-bfb0-2d5b3de102d5,Namespace:kube-system,Attempt:0,} returns sandbox id \"a8f217b747014af3819dbc48c99930f829cefca48764f2af08412c57cc7754e8\"" May 13 00:45:18.563041 kubelet[1943]: E0513 00:45:18.563021 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:18.565162 env[1198]: time="2025-05-13T00:45:18.565004411Z" level=info msg="CreateContainer within sandbox \"a8f217b747014af3819dbc48c99930f829cefca48764f2af08412c57cc7754e8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:45:18.582433 env[1198]: time="2025-05-13T00:45:18.582354651Z" level=info msg="CreateContainer within sandbox \"a8f217b747014af3819dbc48c99930f829cefca48764f2af08412c57cc7754e8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2871bb47b8e22363a8a5d306ac4993bf7e54e92765e6374624c465dba1ac616d\"" May 13 00:45:18.583223 env[1198]: time="2025-05-13T00:45:18.583151919Z" level=info msg="StartContainer for \"2871bb47b8e22363a8a5d306ac4993bf7e54e92765e6374624c465dba1ac616d\"" May 13 00:45:18.599990 systemd[1]: Started cri-containerd-2871bb47b8e22363a8a5d306ac4993bf7e54e92765e6374624c465dba1ac616d.scope. May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc8f030c018 items=0 ppid=2036 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373162623437623865323233363361386135643330366163343939 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit: BPF prog-id=107 op=LOAD May 13 00:45:18.613000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fb258 items=0 ppid=2036 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373162623437623865323233363361386135643330366163343939 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit: BPF prog-id=108 op=LOAD May 13 00:45:18.613000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fb2a8 items=0 ppid=2036 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373162623437623865323233363361386135643330366163343939 May 13 00:45:18.613000 audit: BPF prog-id=108 op=UNLOAD May 13 00:45:18.613000 audit: BPF prog-id=107 op=UNLOAD May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:18.613000 audit: BPF prog-id=109 op=LOAD May 13 00:45:18.613000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fb338 items=0 ppid=2036 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373162623437623865323233363361386135643330366163343939 May 13 00:45:18.647578 env[1198]: time="2025-05-13T00:45:18.647525521Z" level=info msg="StartContainer for \"2871bb47b8e22363a8a5d306ac4993bf7e54e92765e6374624c465dba1ac616d\" returns successfully" May 13 00:45:18.649826 systemd[1]: Created slice kubepods-besteffort-poda1c06e46_f7ea_4dfe_81c1_5683e360d506.slice. May 13 00:45:18.672535 kubelet[1943]: I0513 00:45:18.672482 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a1c06e46-f7ea-4dfe-81c1-5683e360d506-var-lib-calico\") pod \"tigera-operator-789496d6f5-fgmzr\" (UID: \"a1c06e46-f7ea-4dfe-81c1-5683e360d506\") " pod="tigera-operator/tigera-operator-789496d6f5-fgmzr" May 13 00:45:18.672535 kubelet[1943]: I0513 00:45:18.672524 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mvhl2\" (UniqueName: \"kubernetes.io/projected/a1c06e46-f7ea-4dfe-81c1-5683e360d506-kube-api-access-mvhl2\") pod \"tigera-operator-789496d6f5-fgmzr\" (UID: \"a1c06e46-f7ea-4dfe-81c1-5683e360d506\") " pod="tigera-operator/tigera-operator-789496d6f5-fgmzr" May 13 00:45:18.751000 audit[2136]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.751000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0a7e4c60 a2=0 a3=7ffc0a7e4c4c items=0 ppid=2086 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:45:18.752000 audit[2137]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.752000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdb5570e0 a2=0 a3=7fffdb5570cc items=0 ppid=2086 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:45:18.752000 audit[2138]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.752000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff25809c70 a2=0 a3=7fff25809c5c items=0 ppid=2086 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:45:18.755000 audit[2140]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.755000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe19c4e9d0 a2=0 a3=7ffe19c4e9bc items=0 ppid=2086 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:45:18.756000 audit[2141]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.756000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff94493d70 a2=0 a3=7fff94493d5c items=0 ppid=2086 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:45:18.758000 audit[2143]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.758000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca879fb30 a2=0 a3=7ffca879fb1c items=0 ppid=2086 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:45:18.856000 audit[2145]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.856000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdbfc25e80 a2=0 a3=7ffdbfc25e6c items=0 ppid=2086 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:45:18.858000 audit[2147]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.858000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd219e3dd0 a2=0 a3=7ffd219e3dbc items=0 ppid=2086 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:45:18.861000 audit[2150]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.861000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe245958f0 a2=0 a3=7ffe245958dc items=0 ppid=2086 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:45:18.862000 audit[2151]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.862000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec7ccc390 a2=0 a3=7ffec7ccc37c items=0 ppid=2086 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:45:18.865000 audit[2153]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.865000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7abf5fe0 a2=0 a3=7ffd7abf5fcc items=0 ppid=2086 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:45:18.866000 audit[2154]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.866000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc775d5b80 a2=0 a3=7ffc775d5b6c items=0 ppid=2086 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:45:18.868000 audit[2156]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.868000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf91138c0 a2=0 a3=7ffcf91138ac items=0 ppid=2086 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:45:18.871000 audit[2159]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.871000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe981c4b50 a2=0 a3=7ffe981c4b3c items=0 ppid=2086 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:45:18.872000 audit[2160]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.872000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb33bdcf0 a2=0 a3=7fffb33bdcdc items=0 ppid=2086 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:45:18.874000 audit[2162]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.874000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7aaef5e0 a2=0 a3=7ffd7aaef5cc items=0 ppid=2086 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:45:18.875000 audit[2163]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.875000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc10201c80 a2=0 a3=7ffc10201c6c items=0 ppid=2086 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:45:18.877000 audit[2165]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.877000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffead4f2d90 a2=0 a3=7ffead4f2d7c items=0 ppid=2086 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:45:18.880000 audit[2168]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.880000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6b3443b0 a2=0 a3=7ffd6b34439c items=0 ppid=2086 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:45:18.883000 audit[2171]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.883000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7e048330 a2=0 a3=7ffc7e04831c items=0 ppid=2086 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:45:18.884000 audit[2172]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.884000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd78eeb150 a2=0 a3=7ffd78eeb13c items=0 ppid=2086 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:45:18.886000 audit[2174]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.886000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc76dc2c10 a2=0 a3=7ffc76dc2bfc items=0 ppid=2086 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:45:18.889000 audit[2177]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.889000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc8c6afc0 a2=0 a3=7ffcc8c6afac items=0 ppid=2086 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:45:18.890000 audit[2178]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.890000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd0494c80 a2=0 a3=7fffd0494c6c items=0 ppid=2086 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:45:18.892000 audit[2180]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:45:18.892000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd81ae2630 a2=0 a3=7ffd81ae261c items=0 ppid=2086 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:45:18.915000 audit[2186]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:18.915000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff516a6af0 a2=0 a3=7fff516a6adc items=0 ppid=2086 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.915000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:18.923000 audit[2186]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:18.923000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff516a6af0 a2=0 a3=7fff516a6adc items=0 ppid=2086 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.923000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:18.924000 audit[2191]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.924000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc288df270 a2=0 a3=7ffc288df25c items=0 ppid=2086 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:45:18.927000 audit[2193]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.927000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd7e902960 a2=0 a3=7ffd7e90294c items=0 ppid=2086 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:45:18.930000 audit[2196]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.930000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffff21660d0 a2=0 a3=7ffff21660bc items=0 ppid=2086 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:45:18.931000 audit[2197]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.931000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe53446f00 a2=0 a3=7ffe53446eec items=0 ppid=2086 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.931000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:45:18.934000 audit[2199]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.934000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7f8d0720 a2=0 a3=7ffc7f8d070c items=0 ppid=2086 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:45:18.934000 audit[2200]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.934000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd476462c0 a2=0 a3=7ffd476462ac items=0 ppid=2086 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:45:18.936000 audit[2202]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.936000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdae664fe0 a2=0 a3=7ffdae664fcc items=0 ppid=2086 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:45:18.939000 audit[2205]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.939000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff84a2d690 a2=0 a3=7fff84a2d67c items=0 ppid=2086 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:45:18.940000 audit[2206]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.940000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9abe7270 a2=0 a3=7ffc9abe725c items=0 ppid=2086 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:45:18.942000 audit[2208]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.942000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3447eab0 a2=0 a3=7ffd3447ea9c items=0 ppid=2086 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:45:18.943000 audit[2209]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.943000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9d788e90 a2=0 a3=7ffe9d788e7c items=0 ppid=2086 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:45:18.945000 audit[2211]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.945000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5b0ded80 a2=0 a3=7fff5b0ded6c items=0 ppid=2086 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:45:18.948000 audit[2214]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.948000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd32b5740 a2=0 a3=7ffdd32b572c items=0 ppid=2086 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:45:18.951000 audit[2217]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.951000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1b4e2ce0 a2=0 a3=7fff1b4e2ccc items=0 ppid=2086 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:45:18.951000 audit[2218]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.951000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd933ced20 a2=0 a3=7ffd933ced0c items=0 ppid=2086 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:45:18.953929 env[1198]: time="2025-05-13T00:45:18.953897661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-fgmzr,Uid:a1c06e46-f7ea-4dfe-81c1-5683e360d506,Namespace:tigera-operator,Attempt:0,}" May 13 00:45:18.953000 audit[2220]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.953000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcacaf0210 a2=0 a3=7ffcacaf01fc items=0 ppid=2086 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:45:18.956000 audit[2223]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.956000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff3b38d510 a2=0 a3=7fff3b38d4fc items=0 ppid=2086 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:45:18.956000 audit[2224]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.956000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7389f710 a2=0 a3=7fff7389f6fc items=0 ppid=2086 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:45:18.958000 audit[2226]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.958000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe7a7e50a0 a2=0 a3=7ffe7a7e508c items=0 ppid=2086 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:45:18.959000 audit[2227]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.959000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4a8d8460 a2=0 a3=7fff4a8d844c items=0 ppid=2086 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:45:18.961000 audit[2229]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.961000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd65f354f0 a2=0 a3=7ffd65f354dc items=0 ppid=2086 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:45:18.963000 audit[2232]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:45:18.963000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea9dd2f00 a2=0 a3=7ffea9dd2eec items=0 ppid=2086 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:45:18.966000 audit[2234]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:45:18.966000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffed0c20080 a2=0 a3=7ffed0c2006c items=0 ppid=2086 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.966000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:18.966000 audit[2234]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:45:18.966000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffed0c20080 a2=0 a3=7ffed0c2006c items=0 ppid=2086 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:18.966000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:18.994508 env[1198]: time="2025-05-13T00:45:18.994431176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:18.994508 env[1198]: time="2025-05-13T00:45:18.994464789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:18.994508 env[1198]: time="2025-05-13T00:45:18.994475138Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:18.994699 env[1198]: time="2025-05-13T00:45:18.994622929Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f74ec0ced4479dd41b29c497a453b0f8f8efd59249eaed2fc1c5c7c39e03a1c0 pid=2241 runtime=io.containerd.runc.v2 May 13 00:45:19.003547 systemd[1]: Started cri-containerd-f74ec0ced4479dd41b29c497a453b0f8f8efd59249eaed2fc1c5c7c39e03a1c0.scope. May 13 00:45:19.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.017000 audit: BPF prog-id=110 op=LOAD May 13 00:45:19.018000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2241 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:19.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346563306365643434373964643431623239633439376134353362 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2241 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:19.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346563306365643434373964643431623239633439376134353362 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.018000 audit: BPF prog-id=111 op=LOAD May 13 00:45:19.018000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00033e3d0 items=0 ppid=2241 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:19.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346563306365643434373964643431623239633439376134353362 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit: BPF prog-id=112 op=LOAD May 13 00:45:19.019000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00033e418 items=0 ppid=2241 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:19.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346563306365643434373964643431623239633439376134353362 May 13 00:45:19.019000 audit: BPF prog-id=112 op=UNLOAD May 13 00:45:19.019000 audit: BPF prog-id=111 op=UNLOAD May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:19.019000 audit: BPF prog-id=113 op=LOAD May 13 00:45:19.019000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033e828 items=0 ppid=2241 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:19.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346563306365643434373964643431623239633439376134353362 May 13 00:45:19.043442 env[1198]: time="2025-05-13T00:45:19.043342645Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-fgmzr,Uid:a1c06e46-f7ea-4dfe-81c1-5683e360d506,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f74ec0ced4479dd41b29c497a453b0f8f8efd59249eaed2fc1c5c7c39e03a1c0\"" May 13 00:45:19.045483 env[1198]: time="2025-05-13T00:45:19.045438709Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 00:45:19.276562 kubelet[1943]: E0513 00:45:19.276454 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:19.285174 kubelet[1943]: I0513 00:45:19.285120 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-4v888" podStartSLOduration=1.285103641 podStartE2EDuration="1.285103641s" podCreationTimestamp="2025-05-13 00:45:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:45:19.284953197 +0000 UTC m=+7.120352594" watchObservedRunningTime="2025-05-13 00:45:19.285103641 +0000 UTC m=+7.120503038" May 13 00:45:20.034134 kubelet[1943]: E0513 00:45:20.034096 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:20.279343 kubelet[1943]: E0513 00:45:20.279308 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:20.498524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2512435095.mount: Deactivated successfully. May 13 00:45:21.025113 kubelet[1943]: E0513 00:45:21.025070 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:21.281327 kubelet[1943]: E0513 00:45:21.281226 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:22.771834 env[1198]: time="2025-05-13T00:45:22.771784651Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:22.773629 env[1198]: time="2025-05-13T00:45:22.773574492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:22.775213 env[1198]: time="2025-05-13T00:45:22.775179463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:22.776504 env[1198]: time="2025-05-13T00:45:22.776476864Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:22.776886 env[1198]: time="2025-05-13T00:45:22.776856701Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 13 00:45:22.778681 env[1198]: time="2025-05-13T00:45:22.778650119Z" level=info msg="CreateContainer within sandbox \"f74ec0ced4479dd41b29c497a453b0f8f8efd59249eaed2fc1c5c7c39e03a1c0\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 00:45:22.790319 env[1198]: time="2025-05-13T00:45:22.790286917Z" level=info msg="CreateContainer within sandbox \"f74ec0ced4479dd41b29c497a453b0f8f8efd59249eaed2fc1c5c7c39e03a1c0\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b02daf0cc99eebdcfc3957a167b66f4658555316757158ee6fc5e7a548fdb1a3\"" May 13 00:45:22.790741 env[1198]: time="2025-05-13T00:45:22.790716259Z" level=info msg="StartContainer for \"b02daf0cc99eebdcfc3957a167b66f4658555316757158ee6fc5e7a548fdb1a3\"" May 13 00:45:22.806347 systemd[1]: Started cri-containerd-b02daf0cc99eebdcfc3957a167b66f4658555316757158ee6fc5e7a548fdb1a3.scope. May 13 00:45:22.816449 kernel: kauditd_printk_skb: 317 callbacks suppressed May 13 00:45:22.816517 kernel: audit: type=1400 audit(1747097122.812:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.821826 kernel: audit: type=1400 audit(1747097122.812:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.821875 kernel: audit: type=1400 audit(1747097122.812:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.829059 kernel: audit: type=1400 audit(1747097122.812:909): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.829108 kernel: audit: type=1400 audit(1747097122.812:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.836363 kernel: audit: type=1400 audit(1747097122.812:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.836416 kernel: audit: type=1400 audit(1747097122.812:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.842416 kernel: audit: type=1400 audit(1747097122.812:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.842458 kernel: audit: type=1400 audit(1747097122.812:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.845275 kernel: audit: type=1400 audit(1747097122.816:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.816000 audit: BPF prog-id=114 op=LOAD May 13 00:45:22.817000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2241 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:22.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326461663063633939656562646366633339353761313637623636 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2241 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:22.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326461663063633939656562646366633339353761313637623636 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.817000 audit: BPF prog-id=115 op=LOAD May 13 00:45:22.817000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000096370 items=0 ppid=2241 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:22.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326461663063633939656562646366633339353761313637623636 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.820000 audit: BPF prog-id=116 op=LOAD May 13 00:45:22.820000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000963b8 items=0 ppid=2241 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:22.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326461663063633939656562646366633339353761313637623636 May 13 00:45:22.824000 audit: BPF prog-id=116 op=UNLOAD May 13 00:45:22.824000 audit: BPF prog-id=115 op=UNLOAD May 13 00:45:22.824000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:22.824000 audit: BPF prog-id=117 op=LOAD May 13 00:45:22.824000 audit[2282]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000967c8 items=0 ppid=2241 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:22.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230326461663063633939656562646366633339353761313637623636 May 13 00:45:22.854757 env[1198]: time="2025-05-13T00:45:22.854718573Z" level=info msg="StartContainer for \"b02daf0cc99eebdcfc3957a167b66f4658555316757158ee6fc5e7a548fdb1a3\" returns successfully" May 13 00:45:23.023444 kubelet[1943]: E0513 00:45:23.022551 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:23.285682 kubelet[1943]: E0513 00:45:23.285442 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:24.070812 update_engine[1190]: I0513 00:45:24.070755 1190 update_attempter.cc:509] Updating boot flags... May 13 00:45:25.635000 audit[2329]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:25.635000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe4a684c00 a2=0 a3=7ffe4a684bec items=0 ppid=2086 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:25.635000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:25.641000 audit[2329]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:25.641000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe4a684c00 a2=0 a3=0 items=0 ppid=2086 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:25.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:25.652000 audit[2331]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:25.652000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc66e1c750 a2=0 a3=7ffc66e1c73c items=0 ppid=2086 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:25.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:25.658000 audit[2331]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:25.658000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc66e1c750 a2=0 a3=0 items=0 ppid=2086 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:25.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:25.760748 kubelet[1943]: I0513 00:45:25.760669 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-fgmzr" podStartSLOduration=4.027490075 podStartE2EDuration="7.760648876s" podCreationTimestamp="2025-05-13 00:45:18 +0000 UTC" firstStartedPulling="2025-05-13 00:45:19.04463517 +0000 UTC m=+6.880034567" lastFinishedPulling="2025-05-13 00:45:22.777793971 +0000 UTC m=+10.613193368" observedRunningTime="2025-05-13 00:45:23.292759195 +0000 UTC m=+11.128158592" watchObservedRunningTime="2025-05-13 00:45:25.760648876 +0000 UTC m=+13.596048273" May 13 00:45:25.767830 systemd[1]: Created slice kubepods-besteffort-pod889418f4_9958_4967_ac20_f4e859b90a1f.slice. May 13 00:45:25.813654 systemd[1]: Created slice kubepods-besteffort-podf23a568d_4a07_487f_9a6d_3025c22c50be.slice. May 13 00:45:25.823634 kubelet[1943]: I0513 00:45:25.823595 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2hpfv\" (UniqueName: \"kubernetes.io/projected/f23a568d-4a07-487f-9a6d-3025c22c50be-kube-api-access-2hpfv\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.823634 kubelet[1943]: I0513 00:45:25.823635 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rsmb2\" (UniqueName: \"kubernetes.io/projected/889418f4-9958-4967-ac20-f4e859b90a1f-kube-api-access-rsmb2\") pod \"calico-typha-574cdf8b9f-hbqc7\" (UID: \"889418f4-9958-4967-ac20-f4e859b90a1f\") " pod="calico-system/calico-typha-574cdf8b9f-hbqc7" May 13 00:45:25.823634 kubelet[1943]: I0513 00:45:25.823654 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-policysync\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.823849 kubelet[1943]: I0513 00:45:25.823671 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-cni-bin-dir\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.823849 kubelet[1943]: I0513 00:45:25.823755 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-xtables-lock\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.823849 kubelet[1943]: I0513 00:45:25.823801 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f23a568d-4a07-487f-9a6d-3025c22c50be-tigera-ca-bundle\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.823849 kubelet[1943]: I0513 00:45:25.823822 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-cni-net-dir\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.823943 kubelet[1943]: I0513 00:45:25.823869 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-var-run-calico\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.823943 kubelet[1943]: I0513 00:45:25.823895 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-cni-log-dir\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.823943 kubelet[1943]: I0513 00:45:25.823926 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-lib-modules\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.824013 kubelet[1943]: I0513 00:45:25.823949 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/889418f4-9958-4967-ac20-f4e859b90a1f-typha-certs\") pod \"calico-typha-574cdf8b9f-hbqc7\" (UID: \"889418f4-9958-4967-ac20-f4e859b90a1f\") " pod="calico-system/calico-typha-574cdf8b9f-hbqc7" May 13 00:45:25.824013 kubelet[1943]: I0513 00:45:25.823975 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-flexvol-driver-host\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.824060 kubelet[1943]: I0513 00:45:25.824039 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/889418f4-9958-4967-ac20-f4e859b90a1f-tigera-ca-bundle\") pod \"calico-typha-574cdf8b9f-hbqc7\" (UID: \"889418f4-9958-4967-ac20-f4e859b90a1f\") " pod="calico-system/calico-typha-574cdf8b9f-hbqc7" May 13 00:45:25.824084 kubelet[1943]: I0513 00:45:25.824064 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f23a568d-4a07-487f-9a6d-3025c22c50be-node-certs\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.824108 kubelet[1943]: I0513 00:45:25.824082 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f23a568d-4a07-487f-9a6d-3025c22c50be-var-lib-calico\") pod \"calico-node-bdck9\" (UID: \"f23a568d-4a07-487f-9a6d-3025c22c50be\") " pod="calico-system/calico-node-bdck9" May 13 00:45:25.927047 kubelet[1943]: E0513 00:45:25.926924 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.927047 kubelet[1943]: W0513 00:45:25.926976 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.927047 kubelet[1943]: E0513 00:45:25.926999 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.928783 kubelet[1943]: E0513 00:45:25.928698 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.928863 kubelet[1943]: W0513 00:45:25.928843 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.929030 kubelet[1943]: E0513 00:45:25.929011 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.931507 kubelet[1943]: E0513 00:45:25.931196 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.931507 kubelet[1943]: W0513 00:45:25.931218 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.931507 kubelet[1943]: E0513 00:45:25.931250 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.932472 kubelet[1943]: E0513 00:45:25.932442 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.932472 kubelet[1943]: W0513 00:45:25.932463 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.932957 kubelet[1943]: E0513 00:45:25.932928 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.933021 kubelet[1943]: E0513 00:45:25.932976 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.933021 kubelet[1943]: W0513 00:45:25.932984 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.933095 kubelet[1943]: E0513 00:45:25.933068 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.933266 kubelet[1943]: E0513 00:45:25.933252 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.933266 kubelet[1943]: W0513 00:45:25.933263 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.933722 kubelet[1943]: E0513 00:45:25.933708 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.933812 kubelet[1943]: W0513 00:45:25.933794 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.934414 kubelet[1943]: E0513 00:45:25.933727 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.934414 kubelet[1943]: E0513 00:45:25.934331 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.936044 kubelet[1943]: E0513 00:45:25.936019 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.936044 kubelet[1943]: W0513 00:45:25.936036 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.936135 kubelet[1943]: E0513 00:45:25.936090 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.937006 kubelet[1943]: E0513 00:45:25.936978 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:25.939099 kubelet[1943]: E0513 00:45:25.937380 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.939099 kubelet[1943]: W0513 00:45:25.937392 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.939099 kubelet[1943]: E0513 00:45:25.937460 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.939434 kubelet[1943]: E0513 00:45:25.939416 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.939434 kubelet[1943]: W0513 00:45:25.939430 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.939510 kubelet[1943]: E0513 00:45:25.939472 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.940211 kubelet[1943]: E0513 00:45:25.939735 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.940211 kubelet[1943]: W0513 00:45:25.939748 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.940211 kubelet[1943]: E0513 00:45:25.939790 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.940211 kubelet[1943]: E0513 00:45:25.939944 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.940211 kubelet[1943]: W0513 00:45:25.939950 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.940211 kubelet[1943]: E0513 00:45:25.940018 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.940211 kubelet[1943]: E0513 00:45:25.940080 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.940211 kubelet[1943]: W0513 00:45:25.940088 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.940211 kubelet[1943]: E0513 00:45:25.940114 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.940455 kubelet[1943]: E0513 00:45:25.940272 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.940455 kubelet[1943]: W0513 00:45:25.940289 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.940455 kubelet[1943]: E0513 00:45:25.940389 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.940530 kubelet[1943]: E0513 00:45:25.940521 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.940554 kubelet[1943]: W0513 00:45:25.940529 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.942902 kubelet[1943]: E0513 00:45:25.940572 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.942902 kubelet[1943]: E0513 00:45:25.940833 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.942902 kubelet[1943]: W0513 00:45:25.940843 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.942902 kubelet[1943]: E0513 00:45:25.940909 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.942902 kubelet[1943]: E0513 00:45:25.941022 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.942902 kubelet[1943]: W0513 00:45:25.941028 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.942902 kubelet[1943]: E0513 00:45:25.941076 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.942902 kubelet[1943]: E0513 00:45:25.941158 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.942902 kubelet[1943]: W0513 00:45:25.941164 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.942902 kubelet[1943]: E0513 00:45:25.941214 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943186 kubelet[1943]: E0513 00:45:25.941283 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943186 kubelet[1943]: W0513 00:45:25.941289 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943186 kubelet[1943]: E0513 00:45:25.941334 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943186 kubelet[1943]: E0513 00:45:25.941434 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943186 kubelet[1943]: W0513 00:45:25.941440 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943186 kubelet[1943]: E0513 00:45:25.941484 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943186 kubelet[1943]: E0513 00:45:25.941552 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943186 kubelet[1943]: W0513 00:45:25.941557 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943186 kubelet[1943]: E0513 00:45:25.941655 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943186 kubelet[1943]: E0513 00:45:25.941728 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943566 kubelet[1943]: W0513 00:45:25.941735 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943566 kubelet[1943]: E0513 00:45:25.941777 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943566 kubelet[1943]: E0513 00:45:25.942083 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943566 kubelet[1943]: W0513 00:45:25.942090 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943566 kubelet[1943]: E0513 00:45:25.942148 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943566 kubelet[1943]: E0513 00:45:25.942259 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943566 kubelet[1943]: W0513 00:45:25.942267 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943566 kubelet[1943]: E0513 00:45:25.942296 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943566 kubelet[1943]: E0513 00:45:25.942406 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943566 kubelet[1943]: W0513 00:45:25.942413 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943824 kubelet[1943]: E0513 00:45:25.942464 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943824 kubelet[1943]: E0513 00:45:25.942545 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943824 kubelet[1943]: W0513 00:45:25.942550 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943824 kubelet[1943]: E0513 00:45:25.942597 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943824 kubelet[1943]: E0513 00:45:25.942737 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943824 kubelet[1943]: W0513 00:45:25.942744 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943824 kubelet[1943]: E0513 00:45:25.942799 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.943824 kubelet[1943]: E0513 00:45:25.942905 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.943824 kubelet[1943]: W0513 00:45:25.942911 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.943824 kubelet[1943]: E0513 00:45:25.942963 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.944189 kubelet[1943]: E0513 00:45:25.944161 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.944189 kubelet[1943]: W0513 00:45:25.944176 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.944304 kubelet[1943]: E0513 00:45:25.944280 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.944502 kubelet[1943]: E0513 00:45:25.944484 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.944502 kubelet[1943]: W0513 00:45:25.944497 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.946491 kubelet[1943]: E0513 00:45:25.946448 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.946791 kubelet[1943]: E0513 00:45:25.946755 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.946791 kubelet[1943]: W0513 00:45:25.946780 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.947005 kubelet[1943]: E0513 00:45:25.946924 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.947098 kubelet[1943]: E0513 00:45:25.947083 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.947098 kubelet[1943]: W0513 00:45:25.947096 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.947190 kubelet[1943]: E0513 00:45:25.947157 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.947352 kubelet[1943]: E0513 00:45:25.947334 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.947352 kubelet[1943]: W0513 00:45:25.947349 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.947473 kubelet[1943]: E0513 00:45:25.947446 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.947624 kubelet[1943]: E0513 00:45:25.947588 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.947624 kubelet[1943]: W0513 00:45:25.947603 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.947700 kubelet[1943]: E0513 00:45:25.947680 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.951224 kubelet[1943]: E0513 00:45:25.951191 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.951224 kubelet[1943]: W0513 00:45:25.951210 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.951322 kubelet[1943]: E0513 00:45:25.951306 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.951454 kubelet[1943]: E0513 00:45:25.951434 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.951454 kubelet[1943]: W0513 00:45:25.951447 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.951538 kubelet[1943]: E0513 00:45:25.951506 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.951601 kubelet[1943]: E0513 00:45:25.951581 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.951601 kubelet[1943]: W0513 00:45:25.951593 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.951601 kubelet[1943]: E0513 00:45:25.951600 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.965328 kubelet[1943]: E0513 00:45:25.962852 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.965328 kubelet[1943]: W0513 00:45:25.962870 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.965328 kubelet[1943]: E0513 00:45:25.962885 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:25.965328 kubelet[1943]: E0513 00:45:25.964547 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:25.965328 kubelet[1943]: W0513 00:45:25.964563 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:25.965328 kubelet[1943]: E0513 00:45:25.964598 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.012778 kubelet[1943]: E0513 00:45:26.012740 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.012956 kubelet[1943]: W0513 00:45:26.012798 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.012956 kubelet[1943]: E0513 00:45:26.012828 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.013142 kubelet[1943]: E0513 00:45:26.013105 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.013142 kubelet[1943]: W0513 00:45:26.013118 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.013142 kubelet[1943]: E0513 00:45:26.013137 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.013398 kubelet[1943]: E0513 00:45:26.013361 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.013398 kubelet[1943]: W0513 00:45:26.013392 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.013398 kubelet[1943]: E0513 00:45:26.013402 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.013725 kubelet[1943]: E0513 00:45:26.013679 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.013725 kubelet[1943]: W0513 00:45:26.013705 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.013725 kubelet[1943]: E0513 00:45:26.013732 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.013992 kubelet[1943]: E0513 00:45:26.013968 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.013992 kubelet[1943]: W0513 00:45:26.013982 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.013992 kubelet[1943]: E0513 00:45:26.013991 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.014206 kubelet[1943]: E0513 00:45:26.014184 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.014206 kubelet[1943]: W0513 00:45:26.014198 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.014259 kubelet[1943]: E0513 00:45:26.014207 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.014475 kubelet[1943]: E0513 00:45:26.014446 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.014539 kubelet[1943]: W0513 00:45:26.014472 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.014539 kubelet[1943]: E0513 00:45:26.014502 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.014766 kubelet[1943]: E0513 00:45:26.014752 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.014766 kubelet[1943]: W0513 00:45:26.014763 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.014839 kubelet[1943]: E0513 00:45:26.014772 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.014994 kubelet[1943]: E0513 00:45:26.014973 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.014994 kubelet[1943]: W0513 00:45:26.014990 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.015099 kubelet[1943]: E0513 00:45:26.015003 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.015210 kubelet[1943]: E0513 00:45:26.015195 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.015210 kubelet[1943]: W0513 00:45:26.015206 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.015300 kubelet[1943]: E0513 00:45:26.015214 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.015442 kubelet[1943]: E0513 00:45:26.015360 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.015442 kubelet[1943]: W0513 00:45:26.015387 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.015442 kubelet[1943]: E0513 00:45:26.015394 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.015545 kubelet[1943]: E0513 00:45:26.015527 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.015545 kubelet[1943]: W0513 00:45:26.015535 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.015545 kubelet[1943]: E0513 00:45:26.015541 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.015692 kubelet[1943]: E0513 00:45:26.015679 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.015692 kubelet[1943]: W0513 00:45:26.015688 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.015692 kubelet[1943]: E0513 00:45:26.015695 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.015838 kubelet[1943]: E0513 00:45:26.015823 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.015838 kubelet[1943]: W0513 00:45:26.015833 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.015838 kubelet[1943]: E0513 00:45:26.015840 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.015987 kubelet[1943]: E0513 00:45:26.015965 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.015987 kubelet[1943]: W0513 00:45:26.015978 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.015987 kubelet[1943]: E0513 00:45:26.015985 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.016129 kubelet[1943]: E0513 00:45:26.016106 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.016177 kubelet[1943]: W0513 00:45:26.016135 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.016177 kubelet[1943]: E0513 00:45:26.016144 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.016319 kubelet[1943]: E0513 00:45:26.016305 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.016319 kubelet[1943]: W0513 00:45:26.016316 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.016406 kubelet[1943]: E0513 00:45:26.016324 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.016488 kubelet[1943]: E0513 00:45:26.016467 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.016488 kubelet[1943]: W0513 00:45:26.016480 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.016488 kubelet[1943]: E0513 00:45:26.016486 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.016629 kubelet[1943]: E0513 00:45:26.016615 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.016682 kubelet[1943]: W0513 00:45:26.016635 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.016682 kubelet[1943]: E0513 00:45:26.016644 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.016806 kubelet[1943]: E0513 00:45:26.016783 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.016806 kubelet[1943]: W0513 00:45:26.016803 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.016892 kubelet[1943]: E0513 00:45:26.016812 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.026262 kubelet[1943]: E0513 00:45:26.026235 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.026262 kubelet[1943]: W0513 00:45:26.026254 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.026348 kubelet[1943]: E0513 00:45:26.026265 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.026348 kubelet[1943]: I0513 00:45:26.026297 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cc4ea95c-a97c-4a6c-92c7-f7420431f01f-socket-dir\") pod \"csi-node-driver-qt7kw\" (UID: \"cc4ea95c-a97c-4a6c-92c7-f7420431f01f\") " pod="calico-system/csi-node-driver-qt7kw" May 13 00:45:26.026862 kubelet[1943]: E0513 00:45:26.026843 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.026862 kubelet[1943]: W0513 00:45:26.026859 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.026931 kubelet[1943]: E0513 00:45:26.026876 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.026931 kubelet[1943]: I0513 00:45:26.026897 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cc4ea95c-a97c-4a6c-92c7-f7420431f01f-varrun\") pod \"csi-node-driver-qt7kw\" (UID: \"cc4ea95c-a97c-4a6c-92c7-f7420431f01f\") " pod="calico-system/csi-node-driver-qt7kw" May 13 00:45:26.027112 kubelet[1943]: E0513 00:45:26.027064 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.027112 kubelet[1943]: W0513 00:45:26.027088 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.027112 kubelet[1943]: E0513 00:45:26.027097 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.027112 kubelet[1943]: I0513 00:45:26.027108 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cc4ea95c-a97c-4a6c-92c7-f7420431f01f-registration-dir\") pod \"csi-node-driver-qt7kw\" (UID: \"cc4ea95c-a97c-4a6c-92c7-f7420431f01f\") " pod="calico-system/csi-node-driver-qt7kw" May 13 00:45:26.027402 kubelet[1943]: E0513 00:45:26.027359 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.027402 kubelet[1943]: W0513 00:45:26.027400 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.027470 kubelet[1943]: E0513 00:45:26.027426 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.027607 kubelet[1943]: E0513 00:45:26.027593 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.027607 kubelet[1943]: W0513 00:45:26.027603 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.027685 kubelet[1943]: E0513 00:45:26.027660 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.027831 kubelet[1943]: E0513 00:45:26.027816 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.027831 kubelet[1943]: W0513 00:45:26.027827 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.027898 kubelet[1943]: E0513 00:45:26.027848 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.027984 kubelet[1943]: E0513 00:45:26.027970 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.027984 kubelet[1943]: W0513 00:45:26.027979 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.028071 kubelet[1943]: E0513 00:45:26.027991 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.028071 kubelet[1943]: I0513 00:45:26.028029 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cc4ea95c-a97c-4a6c-92c7-f7420431f01f-kubelet-dir\") pod \"csi-node-driver-qt7kw\" (UID: \"cc4ea95c-a97c-4a6c-92c7-f7420431f01f\") " pod="calico-system/csi-node-driver-qt7kw" May 13 00:45:26.028206 kubelet[1943]: E0513 00:45:26.028191 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.028206 kubelet[1943]: W0513 00:45:26.028204 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.028278 kubelet[1943]: E0513 00:45:26.028218 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.028412 kubelet[1943]: E0513 00:45:26.028392 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.028412 kubelet[1943]: W0513 00:45:26.028407 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.028412 kubelet[1943]: E0513 00:45:26.028415 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.028616 kubelet[1943]: E0513 00:45:26.028599 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.028616 kubelet[1943]: W0513 00:45:26.028612 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.028700 kubelet[1943]: E0513 00:45:26.028626 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.028816 kubelet[1943]: E0513 00:45:26.028797 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.028816 kubelet[1943]: W0513 00:45:26.028812 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.028902 kubelet[1943]: E0513 00:45:26.028825 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.028989 kubelet[1943]: E0513 00:45:26.028974 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.028989 kubelet[1943]: W0513 00:45:26.028983 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.028989 kubelet[1943]: E0513 00:45:26.028993 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.029159 kubelet[1943]: E0513 00:45:26.029144 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.029159 kubelet[1943]: W0513 00:45:26.029155 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.029252 kubelet[1943]: E0513 00:45:26.029162 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.029252 kubelet[1943]: I0513 00:45:26.029180 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6lz2p\" (UniqueName: \"kubernetes.io/projected/cc4ea95c-a97c-4a6c-92c7-f7420431f01f-kube-api-access-6lz2p\") pod \"csi-node-driver-qt7kw\" (UID: \"cc4ea95c-a97c-4a6c-92c7-f7420431f01f\") " pod="calico-system/csi-node-driver-qt7kw" May 13 00:45:26.029347 kubelet[1943]: E0513 00:45:26.029334 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.029347 kubelet[1943]: W0513 00:45:26.029344 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.029412 kubelet[1943]: E0513 00:45:26.029351 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.029506 kubelet[1943]: E0513 00:45:26.029494 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.029506 kubelet[1943]: W0513 00:45:26.029503 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.029568 kubelet[1943]: E0513 00:45:26.029510 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.071911 kubelet[1943]: E0513 00:45:26.071861 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:26.072447 env[1198]: time="2025-05-13T00:45:26.072402066Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-574cdf8b9f-hbqc7,Uid:889418f4-9958-4967-ac20-f4e859b90a1f,Namespace:calico-system,Attempt:0,}" May 13 00:45:26.091527 env[1198]: time="2025-05-13T00:45:26.091461061Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:26.091658 env[1198]: time="2025-05-13T00:45:26.091534630Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:26.091658 env[1198]: time="2025-05-13T00:45:26.091556070Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:26.091814 env[1198]: time="2025-05-13T00:45:26.091728766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e pid=2417 runtime=io.containerd.runc.v2 May 13 00:45:26.105361 systemd[1]: Started cri-containerd-06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e.scope. May 13 00:45:26.115644 kubelet[1943]: E0513 00:45:26.115603 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:26.116042 env[1198]: time="2025-05-13T00:45:26.116002819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bdck9,Uid:f23a568d-4a07-487f-9a6d-3025c22c50be,Namespace:calico-system,Attempt:0,}" May 13 00:45:26.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit: BPF prog-id=118 op=LOAD May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2417 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036643437373333343033656334633164353166616333383866373262 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2417 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036643437373333343033656334633164353166616333383866373262 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit: BPF prog-id=119 op=LOAD May 13 00:45:26.120000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000229bf0 items=0 ppid=2417 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036643437373333343033656334633164353166616333383866373262 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit: BPF prog-id=120 op=LOAD May 13 00:45:26.120000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000229c38 items=0 ppid=2417 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036643437373333343033656334633164353166616333383866373262 May 13 00:45:26.120000 audit: BPF prog-id=120 op=UNLOAD May 13 00:45:26.120000 audit: BPF prog-id=119 op=UNLOAD May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.120000 audit: BPF prog-id=121 op=LOAD May 13 00:45:26.120000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030e048 items=0 ppid=2417 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036643437373333343033656334633164353166616333383866373262 May 13 00:45:26.130456 kubelet[1943]: E0513 00:45:26.130424 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.130456 kubelet[1943]: W0513 00:45:26.130448 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.130571 kubelet[1943]: E0513 00:45:26.130467 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.130778 kubelet[1943]: E0513 00:45:26.130743 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.130778 kubelet[1943]: W0513 00:45:26.130760 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.130778 kubelet[1943]: E0513 00:45:26.130774 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.131700 kubelet[1943]: E0513 00:45:26.131677 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.131700 kubelet[1943]: W0513 00:45:26.131694 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.131778 kubelet[1943]: E0513 00:45:26.131714 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.131886 env[1198]: time="2025-05-13T00:45:26.131817294Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:26.131975 kubelet[1943]: E0513 00:45:26.131956 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.131975 kubelet[1943]: W0513 00:45:26.131969 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.132217 kubelet[1943]: E0513 00:45:26.132083 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.132217 kubelet[1943]: E0513 00:45:26.132175 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.132217 kubelet[1943]: W0513 00:45:26.132197 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.132347 kubelet[1943]: E0513 00:45:26.132318 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.132424 env[1198]: time="2025-05-13T00:45:26.131870505Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:26.132424 env[1198]: time="2025-05-13T00:45:26.131881165Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:26.132486 kubelet[1943]: E0513 00:45:26.132450 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.132486 kubelet[1943]: W0513 00:45:26.132467 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.132565 kubelet[1943]: E0513 00:45:26.132541 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.132663 kubelet[1943]: E0513 00:45:26.132642 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.132663 kubelet[1943]: W0513 00:45:26.132658 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.132730 kubelet[1943]: E0513 00:45:26.132669 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.132845 env[1198]: time="2025-05-13T00:45:26.132804556Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71 pid=2449 runtime=io.containerd.runc.v2 May 13 00:45:26.132889 kubelet[1943]: E0513 00:45:26.132860 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.132889 kubelet[1943]: W0513 00:45:26.132867 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.132889 kubelet[1943]: E0513 00:45:26.132878 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.133076 kubelet[1943]: E0513 00:45:26.133057 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.133076 kubelet[1943]: W0513 00:45:26.133070 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.133076 kubelet[1943]: E0513 00:45:26.133079 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.133331 kubelet[1943]: E0513 00:45:26.133309 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.133406 kubelet[1943]: W0513 00:45:26.133333 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.133406 kubelet[1943]: E0513 00:45:26.133346 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.133587 kubelet[1943]: E0513 00:45:26.133569 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.133587 kubelet[1943]: W0513 00:45:26.133581 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.133654 kubelet[1943]: E0513 00:45:26.133648 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.133876 kubelet[1943]: E0513 00:45:26.133856 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.133876 kubelet[1943]: W0513 00:45:26.133875 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.133949 kubelet[1943]: E0513 00:45:26.133939 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.134045 kubelet[1943]: E0513 00:45:26.134017 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.134045 kubelet[1943]: W0513 00:45:26.134037 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.134112 kubelet[1943]: E0513 00:45:26.134097 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.134295 kubelet[1943]: E0513 00:45:26.134199 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.134295 kubelet[1943]: W0513 00:45:26.134211 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.134395 kubelet[1943]: E0513 00:45:26.134306 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.134459 kubelet[1943]: E0513 00:45:26.134439 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.134459 kubelet[1943]: W0513 00:45:26.134452 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.134550 kubelet[1943]: E0513 00:45:26.134518 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.134603 kubelet[1943]: E0513 00:45:26.134599 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.134631 kubelet[1943]: W0513 00:45:26.134604 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.134631 kubelet[1943]: E0513 00:45:26.134612 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.134805 kubelet[1943]: E0513 00:45:26.134783 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.134805 kubelet[1943]: W0513 00:45:26.134796 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.134878 kubelet[1943]: E0513 00:45:26.134807 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.135428 kubelet[1943]: E0513 00:45:26.134985 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.135428 kubelet[1943]: W0513 00:45:26.134996 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.135428 kubelet[1943]: E0513 00:45:26.135042 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.135428 kubelet[1943]: E0513 00:45:26.135349 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.135428 kubelet[1943]: W0513 00:45:26.135355 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.135428 kubelet[1943]: E0513 00:45:26.135417 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.136619 kubelet[1943]: E0513 00:45:26.136585 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.136619 kubelet[1943]: W0513 00:45:26.136599 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.136694 kubelet[1943]: E0513 00:45:26.136662 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.136865 kubelet[1943]: E0513 00:45:26.136837 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.136865 kubelet[1943]: W0513 00:45:26.136851 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.136933 kubelet[1943]: E0513 00:45:26.136902 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.137490 kubelet[1943]: E0513 00:45:26.137470 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.137490 kubelet[1943]: W0513 00:45:26.137486 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.137573 kubelet[1943]: E0513 00:45:26.137561 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.137671 kubelet[1943]: E0513 00:45:26.137649 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.137671 kubelet[1943]: W0513 00:45:26.137662 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.137671 kubelet[1943]: E0513 00:45:26.137671 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.137822 kubelet[1943]: E0513 00:45:26.137804 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.137822 kubelet[1943]: W0513 00:45:26.137817 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.137822 kubelet[1943]: E0513 00:45:26.137825 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.138045 kubelet[1943]: E0513 00:45:26.138023 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.138045 kubelet[1943]: W0513 00:45:26.138036 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.138112 kubelet[1943]: E0513 00:45:26.138054 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.142970 kubelet[1943]: E0513 00:45:26.142947 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:26.142970 kubelet[1943]: W0513 00:45:26.142961 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:26.142970 kubelet[1943]: E0513 00:45:26.142970 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:26.146979 systemd[1]: Started cri-containerd-e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71.scope. May 13 00:45:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit: BPF prog-id=122 op=LOAD May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2449 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346562356666646666356531306231666331613638343238613564 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2449 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346562356666646666356531306231666331613638343238613564 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit: BPF prog-id=123 op=LOAD May 13 00:45:26.157000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c4b80 items=0 ppid=2449 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346562356666646666356531306231666331613638343238613564 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit: BPF prog-id=124 op=LOAD May 13 00:45:26.157000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c4bc8 items=0 ppid=2449 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346562356666646666356531306231666331613638343238613564 May 13 00:45:26.157000 audit: BPF prog-id=124 op=UNLOAD May 13 00:45:26.157000 audit: BPF prog-id=123 op=UNLOAD May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:26.157000 audit: BPF prog-id=125 op=LOAD May 13 00:45:26.157000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c4fd8 items=0 ppid=2449 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346562356666646666356531306231666331613638343238613564 May 13 00:45:26.161531 env[1198]: time="2025-05-13T00:45:26.161482568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-574cdf8b9f-hbqc7,Uid:889418f4-9958-4967-ac20-f4e859b90a1f,Namespace:calico-system,Attempt:0,} returns sandbox id \"06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e\"" May 13 00:45:26.162568 kubelet[1943]: E0513 00:45:26.162098 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:26.164514 env[1198]: time="2025-05-13T00:45:26.164492928Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 00:45:26.177459 env[1198]: time="2025-05-13T00:45:26.177342448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bdck9,Uid:f23a568d-4a07-487f-9a6d-3025c22c50be,Namespace:calico-system,Attempt:0,} returns sandbox id \"e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71\"" May 13 00:45:26.178416 kubelet[1943]: E0513 00:45:26.178044 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:26.672000 audit[2517]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:26.672000 audit[2517]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdbf7cdc70 a2=0 a3=7ffdbf7cdc5c items=0 ppid=2086 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:26.684000 audit[2517]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:26.684000 audit[2517]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdbf7cdc70 a2=0 a3=0 items=0 ppid=2086 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:26.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:28.256640 kubelet[1943]: E0513 00:45:28.256593 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:28.413052 env[1198]: time="2025-05-13T00:45:28.412999194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:28.415019 env[1198]: time="2025-05-13T00:45:28.414988134Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:28.416653 env[1198]: time="2025-05-13T00:45:28.416609963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:28.418900 env[1198]: time="2025-05-13T00:45:28.418866237Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:28.420126 env[1198]: time="2025-05-13T00:45:28.420079255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 13 00:45:28.421536 env[1198]: time="2025-05-13T00:45:28.421501216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:45:28.430411 env[1198]: time="2025-05-13T00:45:28.430351304Z" level=info msg="CreateContainer within sandbox \"06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 00:45:28.445500 env[1198]: time="2025-05-13T00:45:28.445456867Z" level=info msg="CreateContainer within sandbox \"06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\"" May 13 00:45:28.445927 env[1198]: time="2025-05-13T00:45:28.445884132Z" level=info msg="StartContainer for \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\"" May 13 00:45:28.461107 systemd[1]: Started cri-containerd-4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71.scope. May 13 00:45:28.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.475960 kernel: kauditd_printk_skb: 179 callbacks suppressed May 13 00:45:28.476035 kernel: audit: type=1400 audit(1747097128.473:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.481743 kernel: audit: type=1400 audit(1747097128.473:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.481802 kernel: audit: type=1400 audit(1747097128.473:968): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.484569 kernel: audit: type=1400 audit(1747097128.473:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.490501 kernel: audit: type=1400 audit(1747097128.473:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.490545 kernel: audit: type=1400 audit(1747097128.473:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.496567 kernel: audit: type=1400 audit(1747097128.473:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.499801 kernel: audit: type=1400 audit(1747097128.473:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.499852 kernel: audit: type=1400 audit(1747097128.473:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.506391 kernel: audit: type=1400 audit(1747097128.473:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit: BPF prog-id=126 op=LOAD May 13 00:45:28.473000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2417 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:28.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373931333663333662306162326462306431306137316236303431 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2417 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:28.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373931333663333662306162326462306431306137316236303431 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.473000 audit: BPF prog-id=127 op=LOAD May 13 00:45:28.473000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098430 items=0 ppid=2417 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:28.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373931333663333662306162326462306431306137316236303431 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.477000 audit: BPF prog-id=128 op=LOAD May 13 00:45:28.477000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098478 items=0 ppid=2417 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:28.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373931333663333662306162326462306431306137316236303431 May 13 00:45:28.483000 audit: BPF prog-id=128 op=UNLOAD May 13 00:45:28.483000 audit: BPF prog-id=127 op=UNLOAD May 13 00:45:28.483000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:28.483000 audit: BPF prog-id=129 op=LOAD May 13 00:45:28.483000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098888 items=0 ppid=2417 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:28.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433373931333663333662306162326462306431306137316236303431 May 13 00:45:28.527296 env[1198]: time="2025-05-13T00:45:28.527234056Z" level=info msg="StartContainer for \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\" returns successfully" May 13 00:45:29.300394 kubelet[1943]: E0513 00:45:29.297840 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:29.337647 kubelet[1943]: E0513 00:45:29.337599 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.337647 kubelet[1943]: W0513 00:45:29.337620 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.337647 kubelet[1943]: E0513 00:45:29.337639 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.337865 kubelet[1943]: E0513 00:45:29.337780 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.337865 kubelet[1943]: W0513 00:45:29.337787 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.337865 kubelet[1943]: E0513 00:45:29.337794 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.337935 kubelet[1943]: E0513 00:45:29.337931 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.337960 kubelet[1943]: W0513 00:45:29.337937 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.337960 kubelet[1943]: E0513 00:45:29.337945 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.338139 kubelet[1943]: E0513 00:45:29.338117 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.338139 kubelet[1943]: W0513 00:45:29.338127 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.338139 kubelet[1943]: E0513 00:45:29.338134 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.338323 kubelet[1943]: E0513 00:45:29.338305 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.338323 kubelet[1943]: W0513 00:45:29.338315 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.338323 kubelet[1943]: E0513 00:45:29.338322 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.338509 kubelet[1943]: E0513 00:45:29.338490 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.338509 kubelet[1943]: W0513 00:45:29.338500 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.338509 kubelet[1943]: E0513 00:45:29.338507 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.338665 kubelet[1943]: E0513 00:45:29.338648 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.338665 kubelet[1943]: W0513 00:45:29.338657 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.338665 kubelet[1943]: E0513 00:45:29.338664 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.338819 kubelet[1943]: E0513 00:45:29.338809 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.338819 kubelet[1943]: W0513 00:45:29.338818 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.338870 kubelet[1943]: E0513 00:45:29.338824 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.338980 kubelet[1943]: E0513 00:45:29.338969 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.338980 kubelet[1943]: W0513 00:45:29.338978 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.339029 kubelet[1943]: E0513 00:45:29.338984 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.339158 kubelet[1943]: E0513 00:45:29.339140 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.339158 kubelet[1943]: W0513 00:45:29.339150 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.339158 kubelet[1943]: E0513 00:45:29.339156 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.339321 kubelet[1943]: E0513 00:45:29.339309 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.339321 kubelet[1943]: W0513 00:45:29.339319 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.339384 kubelet[1943]: E0513 00:45:29.339327 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.339500 kubelet[1943]: E0513 00:45:29.339489 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.339500 kubelet[1943]: W0513 00:45:29.339498 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.339551 kubelet[1943]: E0513 00:45:29.339505 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.339666 kubelet[1943]: E0513 00:45:29.339655 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.339666 kubelet[1943]: W0513 00:45:29.339664 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.339718 kubelet[1943]: E0513 00:45:29.339671 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.339839 kubelet[1943]: E0513 00:45:29.339828 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.339839 kubelet[1943]: W0513 00:45:29.339837 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.339889 kubelet[1943]: E0513 00:45:29.339844 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.340030 kubelet[1943]: E0513 00:45:29.340019 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.340030 kubelet[1943]: W0513 00:45:29.340028 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.340093 kubelet[1943]: E0513 00:45:29.340036 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.354909 kubelet[1943]: E0513 00:45:29.354876 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.354909 kubelet[1943]: W0513 00:45:29.354888 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.354909 kubelet[1943]: E0513 00:45:29.354897 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.355152 kubelet[1943]: E0513 00:45:29.355127 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.355152 kubelet[1943]: W0513 00:45:29.355139 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.355152 kubelet[1943]: E0513 00:45:29.355151 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.355445 kubelet[1943]: E0513 00:45:29.355425 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.355445 kubelet[1943]: W0513 00:45:29.355444 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.355534 kubelet[1943]: E0513 00:45:29.355469 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.355691 kubelet[1943]: E0513 00:45:29.355673 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.355691 kubelet[1943]: W0513 00:45:29.355686 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.355767 kubelet[1943]: E0513 00:45:29.355703 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.355888 kubelet[1943]: E0513 00:45:29.355874 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.355888 kubelet[1943]: W0513 00:45:29.355884 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.355937 kubelet[1943]: E0513 00:45:29.355897 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.356110 kubelet[1943]: E0513 00:45:29.356094 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.356110 kubelet[1943]: W0513 00:45:29.356106 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.356214 kubelet[1943]: E0513 00:45:29.356121 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.356411 kubelet[1943]: E0513 00:45:29.356397 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.356411 kubelet[1943]: W0513 00:45:29.356408 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.356502 kubelet[1943]: E0513 00:45:29.356423 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.356656 kubelet[1943]: E0513 00:45:29.356642 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.356656 kubelet[1943]: W0513 00:45:29.356652 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.356742 kubelet[1943]: E0513 00:45:29.356700 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.356819 kubelet[1943]: E0513 00:45:29.356802 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.356819 kubelet[1943]: W0513 00:45:29.356814 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.356883 kubelet[1943]: E0513 00:45:29.356848 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.356997 kubelet[1943]: E0513 00:45:29.356982 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.356997 kubelet[1943]: W0513 00:45:29.356992 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.357069 kubelet[1943]: E0513 00:45:29.357006 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.357323 kubelet[1943]: E0513 00:45:29.357298 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.357351 kubelet[1943]: W0513 00:45:29.357319 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.357351 kubelet[1943]: E0513 00:45:29.357344 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.357547 kubelet[1943]: E0513 00:45:29.357536 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.357578 kubelet[1943]: W0513 00:45:29.357549 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.357578 kubelet[1943]: E0513 00:45:29.357567 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.357794 kubelet[1943]: E0513 00:45:29.357782 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.357818 kubelet[1943]: W0513 00:45:29.357795 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.357818 kubelet[1943]: E0513 00:45:29.357813 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.358028 kubelet[1943]: E0513 00:45:29.358014 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.358028 kubelet[1943]: W0513 00:45:29.358025 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.358127 kubelet[1943]: E0513 00:45:29.358033 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.358202 kubelet[1943]: E0513 00:45:29.358190 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.358202 kubelet[1943]: W0513 00:45:29.358199 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.358251 kubelet[1943]: E0513 00:45:29.358212 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.358405 kubelet[1943]: E0513 00:45:29.358394 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.358405 kubelet[1943]: W0513 00:45:29.358403 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.358459 kubelet[1943]: E0513 00:45:29.358416 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.358695 kubelet[1943]: E0513 00:45:29.358680 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.358738 kubelet[1943]: W0513 00:45:29.358696 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.358738 kubelet[1943]: E0513 00:45:29.358715 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:29.358920 kubelet[1943]: E0513 00:45:29.358905 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:29.358920 kubelet[1943]: W0513 00:45:29.358918 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:29.358996 kubelet[1943]: E0513 00:45:29.358930 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.256919 kubelet[1943]: E0513 00:45:30.256627 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:30.298572 kubelet[1943]: I0513 00:45:30.298538 1943 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:45:30.298930 kubelet[1943]: E0513 00:45:30.298898 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:30.347114 kubelet[1943]: E0513 00:45:30.347074 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.347114 kubelet[1943]: W0513 00:45:30.347097 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.347114 kubelet[1943]: E0513 00:45:30.347118 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.347616 kubelet[1943]: E0513 00:45:30.347267 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.347616 kubelet[1943]: W0513 00:45:30.347273 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.347616 kubelet[1943]: E0513 00:45:30.347280 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.347616 kubelet[1943]: E0513 00:45:30.347418 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.347616 kubelet[1943]: W0513 00:45:30.347424 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.347616 kubelet[1943]: E0513 00:45:30.347432 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.347616 kubelet[1943]: E0513 00:45:30.347550 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.347616 kubelet[1943]: W0513 00:45:30.347555 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.347616 kubelet[1943]: E0513 00:45:30.347561 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.348017 kubelet[1943]: E0513 00:45:30.347715 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.348017 kubelet[1943]: W0513 00:45:30.347727 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.348017 kubelet[1943]: E0513 00:45:30.347739 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.348017 kubelet[1943]: E0513 00:45:30.347912 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.348017 kubelet[1943]: W0513 00:45:30.347923 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.348017 kubelet[1943]: E0513 00:45:30.347934 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.348229 kubelet[1943]: E0513 00:45:30.348083 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.348229 kubelet[1943]: W0513 00:45:30.348092 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.348229 kubelet[1943]: E0513 00:45:30.348101 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.348341 kubelet[1943]: E0513 00:45:30.348239 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.348341 kubelet[1943]: W0513 00:45:30.348248 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.348341 kubelet[1943]: E0513 00:45:30.348257 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.348467 kubelet[1943]: E0513 00:45:30.348415 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.348467 kubelet[1943]: W0513 00:45:30.348424 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.348467 kubelet[1943]: E0513 00:45:30.348434 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.348572 kubelet[1943]: E0513 00:45:30.348565 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.348610 kubelet[1943]: W0513 00:45:30.348573 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.348610 kubelet[1943]: E0513 00:45:30.348582 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.348734 kubelet[1943]: E0513 00:45:30.348718 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.348734 kubelet[1943]: W0513 00:45:30.348729 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.348830 kubelet[1943]: E0513 00:45:30.348744 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.348914 kubelet[1943]: E0513 00:45:30.348892 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.348914 kubelet[1943]: W0513 00:45:30.348903 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.348914 kubelet[1943]: E0513 00:45:30.348913 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.349072 kubelet[1943]: E0513 00:45:30.349050 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.349072 kubelet[1943]: W0513 00:45:30.349060 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.349164 kubelet[1943]: E0513 00:45:30.349078 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.349227 kubelet[1943]: E0513 00:45:30.349214 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.349227 kubelet[1943]: W0513 00:45:30.349224 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.349305 kubelet[1943]: E0513 00:45:30.349234 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.349395 kubelet[1943]: E0513 00:45:30.349382 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.349395 kubelet[1943]: W0513 00:45:30.349393 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.349477 kubelet[1943]: E0513 00:45:30.349403 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.365882 kubelet[1943]: E0513 00:45:30.365841 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.365882 kubelet[1943]: W0513 00:45:30.365865 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.365882 kubelet[1943]: E0513 00:45:30.365884 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.366126 kubelet[1943]: E0513 00:45:30.366092 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.366126 kubelet[1943]: W0513 00:45:30.366100 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.366126 kubelet[1943]: E0513 00:45:30.366114 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.366340 kubelet[1943]: E0513 00:45:30.366318 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.366340 kubelet[1943]: W0513 00:45:30.366329 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.366442 kubelet[1943]: E0513 00:45:30.366342 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.366562 kubelet[1943]: E0513 00:45:30.366537 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.366562 kubelet[1943]: W0513 00:45:30.366553 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.366649 kubelet[1943]: E0513 00:45:30.366569 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.366744 kubelet[1943]: E0513 00:45:30.366725 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.366744 kubelet[1943]: W0513 00:45:30.366737 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.366822 kubelet[1943]: E0513 00:45:30.366764 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.366983 kubelet[1943]: E0513 00:45:30.366967 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.366983 kubelet[1943]: W0513 00:45:30.366979 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.367086 kubelet[1943]: E0513 00:45:30.366993 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.367230 kubelet[1943]: E0513 00:45:30.367202 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.367230 kubelet[1943]: W0513 00:45:30.367219 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.367296 kubelet[1943]: E0513 00:45:30.367246 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.367616 kubelet[1943]: E0513 00:45:30.367579 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.367682 kubelet[1943]: W0513 00:45:30.367613 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.367682 kubelet[1943]: E0513 00:45:30.367646 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.367856 kubelet[1943]: E0513 00:45:30.367839 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.367856 kubelet[1943]: W0513 00:45:30.367853 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.367952 kubelet[1943]: E0513 00:45:30.367888 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.368061 kubelet[1943]: E0513 00:45:30.368029 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.368061 kubelet[1943]: W0513 00:45:30.368038 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.368165 kubelet[1943]: E0513 00:45:30.368083 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.368285 kubelet[1943]: E0513 00:45:30.368268 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.368285 kubelet[1943]: W0513 00:45:30.368279 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.368382 kubelet[1943]: E0513 00:45:30.368292 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.368539 kubelet[1943]: E0513 00:45:30.368524 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.368539 kubelet[1943]: W0513 00:45:30.368536 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.368617 kubelet[1943]: E0513 00:45:30.368553 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.368755 kubelet[1943]: E0513 00:45:30.368738 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.368755 kubelet[1943]: W0513 00:45:30.368750 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.368822 kubelet[1943]: E0513 00:45:30.368763 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.368938 kubelet[1943]: E0513 00:45:30.368921 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.368938 kubelet[1943]: W0513 00:45:30.368932 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.368938 kubelet[1943]: E0513 00:45:30.368946 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.369193 kubelet[1943]: E0513 00:45:30.369177 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.369193 kubelet[1943]: W0513 00:45:30.369187 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.369265 kubelet[1943]: E0513 00:45:30.369199 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.369417 kubelet[1943]: E0513 00:45:30.369404 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.369417 kubelet[1943]: W0513 00:45:30.369416 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.369503 kubelet[1943]: E0513 00:45:30.369433 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.369696 kubelet[1943]: E0513 00:45:30.369677 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.369696 kubelet[1943]: W0513 00:45:30.369689 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.369696 kubelet[1943]: E0513 00:45:30.369698 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.369889 kubelet[1943]: E0513 00:45:30.369873 1943 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:45:30.369889 kubelet[1943]: W0513 00:45:30.369885 1943 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:45:30.369975 kubelet[1943]: E0513 00:45:30.369898 1943 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:45:30.372604 env[1198]: time="2025-05-13T00:45:30.372563894Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:30.374471 env[1198]: time="2025-05-13T00:45:30.374433858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:30.375759 env[1198]: time="2025-05-13T00:45:30.375720774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:30.377201 env[1198]: time="2025-05-13T00:45:30.377167741Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:30.377577 env[1198]: time="2025-05-13T00:45:30.377548168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 00:45:30.379606 env[1198]: time="2025-05-13T00:45:30.379572514Z" level=info msg="CreateContainer within sandbox \"e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:45:30.393113 env[1198]: time="2025-05-13T00:45:30.393069923Z" level=info msg="CreateContainer within sandbox \"e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d\"" May 13 00:45:30.393588 env[1198]: time="2025-05-13T00:45:30.393554336Z" level=info msg="StartContainer for \"a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d\"" May 13 00:45:30.415726 systemd[1]: Started cri-containerd-a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d.scope. May 13 00:45:30.426731 systemd[1]: run-containerd-runc-k8s.io-a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d-runc.5cH5bF.mount: Deactivated successfully. May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fd2b830d488 items=0 ppid=2449 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:30.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130353335633634343561363034666364343939666639306431306430 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit: BPF prog-id=130 op=LOAD May 13 00:45:30.436000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000261ba8 items=0 ppid=2449 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:30.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130353335633634343561363034666364343939666639306431306430 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit: BPF prog-id=131 op=LOAD May 13 00:45:30.436000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000261bf8 items=0 ppid=2449 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:30.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130353335633634343561363034666364343939666639306431306430 May 13 00:45:30.436000 audit: BPF prog-id=131 op=UNLOAD May 13 00:45:30.436000 audit: BPF prog-id=130 op=UNLOAD May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:30.436000 audit: BPF prog-id=132 op=LOAD May 13 00:45:30.436000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000261c88 items=0 ppid=2449 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:30.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130353335633634343561363034666364343939666639306431306430 May 13 00:45:30.450570 env[1198]: time="2025-05-13T00:45:30.450529193Z" level=info msg="StartContainer for \"a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d\" returns successfully" May 13 00:45:30.461972 systemd[1]: cri-containerd-a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d.scope: Deactivated successfully. May 13 00:45:30.465000 audit: BPF prog-id=132 op=UNLOAD May 13 00:45:30.479860 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d-rootfs.mount: Deactivated successfully. May 13 00:45:31.027328 env[1198]: time="2025-05-13T00:45:31.027277173Z" level=info msg="shim disconnected" id=a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d May 13 00:45:31.027328 env[1198]: time="2025-05-13T00:45:31.027326706Z" level=warning msg="cleaning up after shim disconnected" id=a0535c6445a604fcd499ff90d10d074b8758fc99debb1483ab5a12b7c7dd8c8d namespace=k8s.io May 13 00:45:31.027690 env[1198]: time="2025-05-13T00:45:31.027337566Z" level=info msg="cleaning up dead shim" May 13 00:45:31.033114 env[1198]: time="2025-05-13T00:45:31.033075128Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:45:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2672 runtime=io.containerd.runc.v2\n" May 13 00:45:31.301325 kubelet[1943]: E0513 00:45:31.301232 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:31.302038 env[1198]: time="2025-05-13T00:45:31.301993946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:45:31.314261 kubelet[1943]: I0513 00:45:31.314184 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-574cdf8b9f-hbqc7" podStartSLOduration=4.05736292 podStartE2EDuration="6.314161033s" podCreationTimestamp="2025-05-13 00:45:25 +0000 UTC" firstStartedPulling="2025-05-13 00:45:26.164220734 +0000 UTC m=+13.999620131" lastFinishedPulling="2025-05-13 00:45:28.421018857 +0000 UTC m=+16.256418244" observedRunningTime="2025-05-13 00:45:29.309188291 +0000 UTC m=+17.144587688" watchObservedRunningTime="2025-05-13 00:45:31.314161033 +0000 UTC m=+19.149560431" May 13 00:45:32.257253 kubelet[1943]: E0513 00:45:32.257214 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:34.256974 kubelet[1943]: E0513 00:45:34.256918 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:36.256563 kubelet[1943]: E0513 00:45:36.256502 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:36.394139 systemd[1]: Started sshd@7-10.0.0.89:22-10.0.0.1:37010.service. May 13 00:45:36.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.89:22-10.0.0.1:37010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:36.395387 kernel: kauditd_printk_skb: 91 callbacks suppressed May 13 00:45:36.395437 kernel: audit: type=1130 audit(1747097136.392:991): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.89:22-10.0.0.1:37010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:36.729000 audit[2690]: USER_ACCT pid=2690 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.731854 sshd[2690]: Accepted publickey for core from 10.0.0.1 port 37010 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:45:36.734000 audit[2690]: CRED_ACQ pid=2690 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.736649 sshd[2690]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:36.741403 kernel: audit: type=1101 audit(1747097136.729:992): pid=2690 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.741511 kernel: audit: type=1103 audit(1747097136.734:993): pid=2690 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.741543 kernel: audit: type=1006 audit(1747097136.734:994): pid=2690 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 13 00:45:36.741457 systemd[1]: Started session-8.scope. May 13 00:45:36.741717 systemd-logind[1188]: New session 8 of user core. May 13 00:45:36.743414 kernel: audit: type=1300 audit(1747097136.734:994): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd08691f0 a2=3 a3=0 items=0 ppid=1 pid=2690 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:36.734000 audit[2690]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd08691f0 a2=3 a3=0 items=0 ppid=1 pid=2690 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:36.734000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:36.749842 kernel: audit: type=1327 audit(1747097136.734:994): proctitle=737368643A20636F7265205B707269765D May 13 00:45:36.749904 kernel: audit: type=1105 audit(1747097136.745:995): pid=2690 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.745000 audit[2690]: USER_START pid=2690 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.754901 kernel: audit: type=1103 audit(1747097136.746:996): pid=2692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.746000 audit[2692]: CRED_ACQ pid=2692 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.861108 sshd[2690]: pam_unix(sshd:session): session closed for user core May 13 00:45:36.871209 kernel: audit: type=1106 audit(1747097136.860:997): pid=2690 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.871302 kernel: audit: type=1104 audit(1747097136.860:998): pid=2690 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.860000 audit[2690]: USER_END pid=2690 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.860000 audit[2690]: CRED_DISP pid=2690 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:36.863243 systemd[1]: sshd@7-10.0.0.89:22-10.0.0.1:37010.service: Deactivated successfully. May 13 00:45:36.864019 systemd[1]: session-8.scope: Deactivated successfully. May 13 00:45:36.864952 systemd-logind[1188]: Session 8 logged out. Waiting for processes to exit. May 13 00:45:36.865699 systemd-logind[1188]: Removed session 8. May 13 00:45:36.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.89:22-10.0.0.1:37010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:38.257023 kubelet[1943]: E0513 00:45:38.256954 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:39.451113 env[1198]: time="2025-05-13T00:45:39.451051708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:39.453725 env[1198]: time="2025-05-13T00:45:39.453695475Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:39.457757 env[1198]: time="2025-05-13T00:45:39.457710942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:39.459158 env[1198]: time="2025-05-13T00:45:39.459125314Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:39.459688 env[1198]: time="2025-05-13T00:45:39.459657536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 00:45:39.469477 env[1198]: time="2025-05-13T00:45:39.469435611Z" level=info msg="CreateContainer within sandbox \"e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:45:39.482550 env[1198]: time="2025-05-13T00:45:39.482492265Z" level=info msg="CreateContainer within sandbox \"e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c60f9fb8c6dea99e4b70fe64715b7715aee692df6209eaf1dc146a042f11bfde\"" May 13 00:45:39.483023 env[1198]: time="2025-05-13T00:45:39.482998358Z" level=info msg="StartContainer for \"c60f9fb8c6dea99e4b70fe64715b7715aee692df6209eaf1dc146a042f11bfde\"" May 13 00:45:39.501263 systemd[1]: Started cri-containerd-c60f9fb8c6dea99e4b70fe64715b7715aee692df6209eaf1dc146a042f11bfde.scope. May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcd1424a368 items=0 ppid=2449 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:39.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336306639666238633664656139396534623730666536343731356237 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit: BPF prog-id=133 op=LOAD May 13 00:45:39.511000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00025feb8 items=0 ppid=2449 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:39.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336306639666238633664656139396534623730666536343731356237 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit: BPF prog-id=134 op=LOAD May 13 00:45:39.511000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00025ff08 items=0 ppid=2449 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:39.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336306639666238633664656139396534623730666536343731356237 May 13 00:45:39.511000 audit: BPF prog-id=134 op=UNLOAD May 13 00:45:39.511000 audit: BPF prog-id=133 op=UNLOAD May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:39.511000 audit: BPF prog-id=135 op=LOAD May 13 00:45:39.511000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00025ff98 items=0 ppid=2449 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:39.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336306639666238633664656139396534623730666536343731356237 May 13 00:45:39.668108 env[1198]: time="2025-05-13T00:45:39.667969522Z" level=info msg="StartContainer for \"c60f9fb8c6dea99e4b70fe64715b7715aee692df6209eaf1dc146a042f11bfde\" returns successfully" May 13 00:45:40.256906 kubelet[1943]: E0513 00:45:40.256837 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:40.490828 kubelet[1943]: E0513 00:45:40.490800 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:40.634454 env[1198]: time="2025-05-13T00:45:40.634390589Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:45:40.636017 systemd[1]: cri-containerd-c60f9fb8c6dea99e4b70fe64715b7715aee692df6209eaf1dc146a042f11bfde.scope: Deactivated successfully. May 13 00:45:40.639000 audit: BPF prog-id=135 op=UNLOAD May 13 00:45:40.651307 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c60f9fb8c6dea99e4b70fe64715b7715aee692df6209eaf1dc146a042f11bfde-rootfs.mount: Deactivated successfully. May 13 00:45:40.655718 env[1198]: time="2025-05-13T00:45:40.655663304Z" level=info msg="shim disconnected" id=c60f9fb8c6dea99e4b70fe64715b7715aee692df6209eaf1dc146a042f11bfde May 13 00:45:40.655718 env[1198]: time="2025-05-13T00:45:40.655712777Z" level=warning msg="cleaning up after shim disconnected" id=c60f9fb8c6dea99e4b70fe64715b7715aee692df6209eaf1dc146a042f11bfde namespace=k8s.io May 13 00:45:40.655819 env[1198]: time="2025-05-13T00:45:40.655722816Z" level=info msg="cleaning up dead shim" May 13 00:45:40.661360 env[1198]: time="2025-05-13T00:45:40.661325430Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:45:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2754 runtime=io.containerd.runc.v2\n" May 13 00:45:40.665224 kubelet[1943]: I0513 00:45:40.665206 1943 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 13 00:45:40.692049 systemd[1]: Created slice kubepods-burstable-pod873ef155_f7ef_4d06_a3e2_7be850c7a3ec.slice. May 13 00:45:40.698140 systemd[1]: Created slice kubepods-burstable-pode28234ba_dcea_49e7_8e00_9577ae7d87d2.slice. May 13 00:45:40.709387 systemd[1]: Created slice kubepods-besteffort-podac679fab_6266_466a_afb9_62d9c95cebb7.slice. May 13 00:45:40.714135 systemd[1]: Created slice kubepods-besteffort-pod087c8e13_074f_4fde_b3bf_565afc56de3e.slice. May 13 00:45:40.718805 systemd[1]: Created slice kubepods-besteffort-podc2f71248_d833_4bac_99fb_c72ed63f199e.slice. May 13 00:45:40.725303 systemd[1]: Created slice kubepods-besteffort-pod53bc8e8a_8278_4145_89d0_64d17addf6bd.slice. May 13 00:45:40.748867 kubelet[1943]: I0513 00:45:40.748830 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ac679fab-6266-466a-afb9-62d9c95cebb7-calico-apiserver-certs\") pod \"calico-apiserver-58ccc857f4-zx5gj\" (UID: \"ac679fab-6266-466a-afb9-62d9c95cebb7\") " pod="calico-apiserver/calico-apiserver-58ccc857f4-zx5gj" May 13 00:45:40.748867 kubelet[1943]: I0513 00:45:40.748867 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mzp2d\" (UniqueName: \"kubernetes.io/projected/087c8e13-074f-4fde-b3bf-565afc56de3e-kube-api-access-mzp2d\") pod \"calico-apiserver-58ccc857f4-5zdsn\" (UID: \"087c8e13-074f-4fde-b3bf-565afc56de3e\") " pod="calico-apiserver/calico-apiserver-58ccc857f4-5zdsn" May 13 00:45:40.749117 kubelet[1943]: I0513 00:45:40.748884 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e28234ba-dcea-49e7-8e00-9577ae7d87d2-config-volume\") pod \"coredns-668d6bf9bc-qgl96\" (UID: \"e28234ba-dcea-49e7-8e00-9577ae7d87d2\") " pod="kube-system/coredns-668d6bf9bc-qgl96" May 13 00:45:40.749117 kubelet[1943]: I0513 00:45:40.748912 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7kkcs\" (UniqueName: \"kubernetes.io/projected/873ef155-f7ef-4d06-a3e2-7be850c7a3ec-kube-api-access-7kkcs\") pod \"coredns-668d6bf9bc-wptff\" (UID: \"873ef155-f7ef-4d06-a3e2-7be850c7a3ec\") " pod="kube-system/coredns-668d6bf9bc-wptff" May 13 00:45:40.749117 kubelet[1943]: I0513 00:45:40.748926 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/087c8e13-074f-4fde-b3bf-565afc56de3e-calico-apiserver-certs\") pod \"calico-apiserver-58ccc857f4-5zdsn\" (UID: \"087c8e13-074f-4fde-b3bf-565afc56de3e\") " pod="calico-apiserver/calico-apiserver-58ccc857f4-5zdsn" May 13 00:45:40.749117 kubelet[1943]: I0513 00:45:40.748940 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/873ef155-f7ef-4d06-a3e2-7be850c7a3ec-config-volume\") pod \"coredns-668d6bf9bc-wptff\" (UID: \"873ef155-f7ef-4d06-a3e2-7be850c7a3ec\") " pod="kube-system/coredns-668d6bf9bc-wptff" May 13 00:45:40.749117 kubelet[1943]: I0513 00:45:40.748953 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9wbmz\" (UniqueName: \"kubernetes.io/projected/c2f71248-d833-4bac-99fb-c72ed63f199e-kube-api-access-9wbmz\") pod \"calico-apiserver-6d557d699b-thb6g\" (UID: \"c2f71248-d833-4bac-99fb-c72ed63f199e\") " pod="calico-apiserver/calico-apiserver-6d557d699b-thb6g" May 13 00:45:40.749246 kubelet[1943]: I0513 00:45:40.748988 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s8mh9\" (UniqueName: \"kubernetes.io/projected/53bc8e8a-8278-4145-89d0-64d17addf6bd-kube-api-access-s8mh9\") pod \"calico-kube-controllers-6b8658597f-c8g2s\" (UID: \"53bc8e8a-8278-4145-89d0-64d17addf6bd\") " pod="calico-system/calico-kube-controllers-6b8658597f-c8g2s" May 13 00:45:40.749246 kubelet[1943]: I0513 00:45:40.749012 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rnmwv\" (UniqueName: \"kubernetes.io/projected/e28234ba-dcea-49e7-8e00-9577ae7d87d2-kube-api-access-rnmwv\") pod \"coredns-668d6bf9bc-qgl96\" (UID: \"e28234ba-dcea-49e7-8e00-9577ae7d87d2\") " pod="kube-system/coredns-668d6bf9bc-qgl96" May 13 00:45:40.749246 kubelet[1943]: I0513 00:45:40.749029 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5xc7\" (UniqueName: \"kubernetes.io/projected/ac679fab-6266-466a-afb9-62d9c95cebb7-kube-api-access-d5xc7\") pod \"calico-apiserver-58ccc857f4-zx5gj\" (UID: \"ac679fab-6266-466a-afb9-62d9c95cebb7\") " pod="calico-apiserver/calico-apiserver-58ccc857f4-zx5gj" May 13 00:45:40.749246 kubelet[1943]: I0513 00:45:40.749041 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c2f71248-d833-4bac-99fb-c72ed63f199e-calico-apiserver-certs\") pod \"calico-apiserver-6d557d699b-thb6g\" (UID: \"c2f71248-d833-4bac-99fb-c72ed63f199e\") " pod="calico-apiserver/calico-apiserver-6d557d699b-thb6g" May 13 00:45:40.749246 kubelet[1943]: I0513 00:45:40.749074 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53bc8e8a-8278-4145-89d0-64d17addf6bd-tigera-ca-bundle\") pod \"calico-kube-controllers-6b8658597f-c8g2s\" (UID: \"53bc8e8a-8278-4145-89d0-64d17addf6bd\") " pod="calico-system/calico-kube-controllers-6b8658597f-c8g2s" May 13 00:45:40.995959 kubelet[1943]: E0513 00:45:40.995820 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:40.996671 env[1198]: time="2025-05-13T00:45:40.996616639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-wptff,Uid:873ef155-f7ef-4d06-a3e2-7be850c7a3ec,Namespace:kube-system,Attempt:0,}" May 13 00:45:41.001218 kubelet[1943]: E0513 00:45:41.001176 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:41.001986 env[1198]: time="2025-05-13T00:45:41.001944736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qgl96,Uid:e28234ba-dcea-49e7-8e00-9577ae7d87d2,Namespace:kube-system,Attempt:0,}" May 13 00:45:41.012564 env[1198]: time="2025-05-13T00:45:41.012516050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58ccc857f4-zx5gj,Uid:ac679fab-6266-466a-afb9-62d9c95cebb7,Namespace:calico-apiserver,Attempt:0,}" May 13 00:45:41.017294 env[1198]: time="2025-05-13T00:45:41.017254426Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58ccc857f4-5zdsn,Uid:087c8e13-074f-4fde-b3bf-565afc56de3e,Namespace:calico-apiserver,Attempt:0,}" May 13 00:45:41.023476 env[1198]: time="2025-05-13T00:45:41.023413546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d557d699b-thb6g,Uid:c2f71248-d833-4bac-99fb-c72ed63f199e,Namespace:calico-apiserver,Attempt:0,}" May 13 00:45:41.028587 env[1198]: time="2025-05-13T00:45:41.028540054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b8658597f-c8g2s,Uid:53bc8e8a-8278-4145-89d0-64d17addf6bd,Namespace:calico-system,Attempt:0,}" May 13 00:45:41.099414 env[1198]: time="2025-05-13T00:45:41.099308477Z" level=error msg="Failed to destroy network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.099833 env[1198]: time="2025-05-13T00:45:41.099789762Z" level=error msg="encountered an error cleaning up failed sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.099893 env[1198]: time="2025-05-13T00:45:41.099853583Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-wptff,Uid:873ef155-f7ef-4d06-a3e2-7be850c7a3ec,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.100165 kubelet[1943]: E0513 00:45:41.100115 1943 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.100230 kubelet[1943]: E0513 00:45:41.100205 1943 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-wptff" May 13 00:45:41.100258 kubelet[1943]: E0513 00:45:41.100232 1943 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-wptff" May 13 00:45:41.100324 kubelet[1943]: E0513 00:45:41.100287 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-wptff_kube-system(873ef155-f7ef-4d06-a3e2-7be850c7a3ec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-wptff_kube-system(873ef155-f7ef-4d06-a3e2-7be850c7a3ec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-wptff" podUID="873ef155-f7ef-4d06-a3e2-7be850c7a3ec" May 13 00:45:41.123250 env[1198]: time="2025-05-13T00:45:41.123115637Z" level=error msg="Failed to destroy network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.124319 env[1198]: time="2025-05-13T00:45:41.124273646Z" level=error msg="encountered an error cleaning up failed sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.124442 env[1198]: time="2025-05-13T00:45:41.124345852Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qgl96,Uid:e28234ba-dcea-49e7-8e00-9577ae7d87d2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.124642 kubelet[1943]: E0513 00:45:41.124601 1943 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.124736 kubelet[1943]: E0513 00:45:41.124676 1943 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-qgl96" May 13 00:45:41.124736 kubelet[1943]: E0513 00:45:41.124712 1943 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-qgl96" May 13 00:45:41.124814 kubelet[1943]: E0513 00:45:41.124758 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-qgl96_kube-system(e28234ba-dcea-49e7-8e00-9577ae7d87d2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-qgl96_kube-system(e28234ba-dcea-49e7-8e00-9577ae7d87d2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-qgl96" podUID="e28234ba-dcea-49e7-8e00-9577ae7d87d2" May 13 00:45:41.159300 env[1198]: time="2025-05-13T00:45:41.159243613Z" level=error msg="Failed to destroy network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.159825 env[1198]: time="2025-05-13T00:45:41.159799920Z" level=error msg="encountered an error cleaning up failed sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.159947 env[1198]: time="2025-05-13T00:45:41.159918312Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58ccc857f4-5zdsn,Uid:087c8e13-074f-4fde-b3bf-565afc56de3e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.160634 kubelet[1943]: E0513 00:45:41.160248 1943 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.160634 kubelet[1943]: E0513 00:45:41.160314 1943 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-58ccc857f4-5zdsn" May 13 00:45:41.160634 kubelet[1943]: E0513 00:45:41.160336 1943 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-58ccc857f4-5zdsn" May 13 00:45:41.160767 kubelet[1943]: E0513 00:45:41.160390 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-58ccc857f4-5zdsn_calico-apiserver(087c8e13-074f-4fde-b3bf-565afc56de3e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-58ccc857f4-5zdsn_calico-apiserver(087c8e13-074f-4fde-b3bf-565afc56de3e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-58ccc857f4-5zdsn" podUID="087c8e13-074f-4fde-b3bf-565afc56de3e" May 13 00:45:41.171574 env[1198]: time="2025-05-13T00:45:41.171506530Z" level=error msg="Failed to destroy network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.172057 env[1198]: time="2025-05-13T00:45:41.171983386Z" level=error msg="encountered an error cleaning up failed sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.172119 env[1198]: time="2025-05-13T00:45:41.172085158Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58ccc857f4-zx5gj,Uid:ac679fab-6266-466a-afb9-62d9c95cebb7,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.172362 kubelet[1943]: E0513 00:45:41.172319 1943 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.172436 kubelet[1943]: E0513 00:45:41.172397 1943 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-58ccc857f4-zx5gj" May 13 00:45:41.172436 kubelet[1943]: E0513 00:45:41.172414 1943 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-58ccc857f4-zx5gj" May 13 00:45:41.172484 kubelet[1943]: E0513 00:45:41.172456 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-58ccc857f4-zx5gj_calico-apiserver(ac679fab-6266-466a-afb9-62d9c95cebb7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-58ccc857f4-zx5gj_calico-apiserver(ac679fab-6266-466a-afb9-62d9c95cebb7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-58ccc857f4-zx5gj" podUID="ac679fab-6266-466a-afb9-62d9c95cebb7" May 13 00:45:41.179273 env[1198]: time="2025-05-13T00:45:41.179214515Z" level=error msg="Failed to destroy network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.179586 env[1198]: time="2025-05-13T00:45:41.179551989Z" level=error msg="encountered an error cleaning up failed sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.179630 env[1198]: time="2025-05-13T00:45:41.179601333Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b8658597f-c8g2s,Uid:53bc8e8a-8278-4145-89d0-64d17addf6bd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.179835 kubelet[1943]: E0513 00:45:41.179801 1943 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.179910 kubelet[1943]: E0513 00:45:41.179862 1943 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6b8658597f-c8g2s" May 13 00:45:41.179910 kubelet[1943]: E0513 00:45:41.179881 1943 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6b8658597f-c8g2s" May 13 00:45:41.179970 kubelet[1943]: E0513 00:45:41.179929 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6b8658597f-c8g2s_calico-system(53bc8e8a-8278-4145-89d0-64d17addf6bd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6b8658597f-c8g2s_calico-system(53bc8e8a-8278-4145-89d0-64d17addf6bd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6b8658597f-c8g2s" podUID="53bc8e8a-8278-4145-89d0-64d17addf6bd" May 13 00:45:41.181408 env[1198]: time="2025-05-13T00:45:41.181358249Z" level=error msg="Failed to destroy network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.181685 env[1198]: time="2025-05-13T00:45:41.181655258Z" level=error msg="encountered an error cleaning up failed sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.181755 env[1198]: time="2025-05-13T00:45:41.181700653Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d557d699b-thb6g,Uid:c2f71248-d833-4bac-99fb-c72ed63f199e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.181954 kubelet[1943]: E0513 00:45:41.181907 1943 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.182105 kubelet[1943]: E0513 00:45:41.181969 1943 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d557d699b-thb6g" May 13 00:45:41.182105 kubelet[1943]: E0513 00:45:41.181994 1943 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d557d699b-thb6g" May 13 00:45:41.182105 kubelet[1943]: E0513 00:45:41.182037 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6d557d699b-thb6g_calico-apiserver(c2f71248-d833-4bac-99fb-c72ed63f199e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6d557d699b-thb6g_calico-apiserver(c2f71248-d833-4bac-99fb-c72ed63f199e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d557d699b-thb6g" podUID="c2f71248-d833-4bac-99fb-c72ed63f199e" May 13 00:45:41.261071 kubelet[1943]: I0513 00:45:41.260321 1943 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:45:41.261071 kubelet[1943]: E0513 00:45:41.260716 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:41.283000 audit[3008]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:41.283000 audit[3008]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff948cdce0 a2=0 a3=7fff948cdccc items=0 ppid=2086 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:41.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:41.290000 audit[3008]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:41.290000 audit[3008]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff948cdce0 a2=0 a3=7fff948cdccc items=0 ppid=2086 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:41.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:41.493341 kubelet[1943]: I0513 00:45:41.493305 1943 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:45:41.494052 env[1198]: time="2025-05-13T00:45:41.493985765Z" level=info msg="StopPodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\"" May 13 00:45:41.494586 kubelet[1943]: I0513 00:45:41.494543 1943 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:45:41.495132 env[1198]: time="2025-05-13T00:45:41.495102686Z" level=info msg="StopPodSandbox for \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\"" May 13 00:45:41.497220 kubelet[1943]: E0513 00:45:41.497195 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:41.499250 env[1198]: time="2025-05-13T00:45:41.499209184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:45:41.500696 kubelet[1943]: I0513 00:45:41.500142 1943 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:45:41.500820 env[1198]: time="2025-05-13T00:45:41.500781573Z" level=info msg="StopPodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\"" May 13 00:45:41.503104 kubelet[1943]: I0513 00:45:41.503074 1943 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:45:41.505665 env[1198]: time="2025-05-13T00:45:41.505612604Z" level=info msg="StopPodSandbox for \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\"" May 13 00:45:41.508702 kubelet[1943]: I0513 00:45:41.508672 1943 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:45:41.509248 env[1198]: time="2025-05-13T00:45:41.509214272Z" level=info msg="StopPodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\"" May 13 00:45:41.510488 kubelet[1943]: E0513 00:45:41.510455 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:41.510552 kubelet[1943]: I0513 00:45:41.510522 1943 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:45:41.511161 env[1198]: time="2025-05-13T00:45:41.511055687Z" level=info msg="StopPodSandbox for \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\"" May 13 00:45:41.542184 env[1198]: time="2025-05-13T00:45:41.542123421Z" level=error msg="StopPodSandbox for \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\" failed" error="failed to destroy network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.542587 kubelet[1943]: E0513 00:45:41.542548 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:45:41.542660 kubelet[1943]: E0513 00:45:41.542615 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407"} May 13 00:45:41.542687 kubelet[1943]: E0513 00:45:41.542670 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"087c8e13-074f-4fde-b3bf-565afc56de3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:41.542751 kubelet[1943]: E0513 00:45:41.542693 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"087c8e13-074f-4fde-b3bf-565afc56de3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-58ccc857f4-5zdsn" podUID="087c8e13-074f-4fde-b3bf-565afc56de3e" May 13 00:45:41.543559 env[1198]: time="2025-05-13T00:45:41.543486105Z" level=error msg="StopPodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\" failed" error="failed to destroy network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.544067 kubelet[1943]: E0513 00:45:41.544018 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:45:41.544156 kubelet[1943]: E0513 00:45:41.544091 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425"} May 13 00:45:41.544156 kubelet[1943]: E0513 00:45:41.544126 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c2f71248-d833-4bac-99fb-c72ed63f199e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:41.544285 kubelet[1943]: E0513 00:45:41.544168 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c2f71248-d833-4bac-99fb-c72ed63f199e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d557d699b-thb6g" podUID="c2f71248-d833-4bac-99fb-c72ed63f199e" May 13 00:45:41.547794 env[1198]: time="2025-05-13T00:45:41.547740100Z" level=error msg="StopPodSandbox for \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\" failed" error="failed to destroy network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.548226 kubelet[1943]: E0513 00:45:41.548105 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:45:41.548226 kubelet[1943]: E0513 00:45:41.548151 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5"} May 13 00:45:41.548226 kubelet[1943]: E0513 00:45:41.548182 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e28234ba-dcea-49e7-8e00-9577ae7d87d2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:41.548226 kubelet[1943]: E0513 00:45:41.548201 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e28234ba-dcea-49e7-8e00-9577ae7d87d2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-qgl96" podUID="e28234ba-dcea-49e7-8e00-9577ae7d87d2" May 13 00:45:41.573174 env[1198]: time="2025-05-13T00:45:41.573116043Z" level=error msg="StopPodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\" failed" error="failed to destroy network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.573724 kubelet[1943]: E0513 00:45:41.573649 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:45:41.573881 kubelet[1943]: E0513 00:45:41.573729 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14"} May 13 00:45:41.573881 kubelet[1943]: E0513 00:45:41.573776 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"53bc8e8a-8278-4145-89d0-64d17addf6bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:41.573881 kubelet[1943]: E0513 00:45:41.573809 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"53bc8e8a-8278-4145-89d0-64d17addf6bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6b8658597f-c8g2s" podUID="53bc8e8a-8278-4145-89d0-64d17addf6bd" May 13 00:45:41.574412 env[1198]: time="2025-05-13T00:45:41.574316071Z" level=error msg="StopPodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\" failed" error="failed to destroy network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.574735 kubelet[1943]: E0513 00:45:41.574620 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:45:41.574735 kubelet[1943]: E0513 00:45:41.574704 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0"} May 13 00:45:41.574836 kubelet[1943]: E0513 00:45:41.574741 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"873ef155-f7ef-4d06-a3e2-7be850c7a3ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:41.574836 kubelet[1943]: E0513 00:45:41.574767 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"873ef155-f7ef-4d06-a3e2-7be850c7a3ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-wptff" podUID="873ef155-f7ef-4d06-a3e2-7be850c7a3ec" May 13 00:45:41.575566 env[1198]: time="2025-05-13T00:45:41.575512132Z" level=error msg="StopPodSandbox for \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\" failed" error="failed to destroy network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:41.575752 kubelet[1943]: E0513 00:45:41.575722 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:45:41.575752 kubelet[1943]: E0513 00:45:41.575751 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3"} May 13 00:45:41.575851 kubelet[1943]: E0513 00:45:41.575770 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ac679fab-6266-466a-afb9-62d9c95cebb7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:41.575851 kubelet[1943]: E0513 00:45:41.575786 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ac679fab-6266-466a-afb9-62d9c95cebb7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-58ccc857f4-zx5gj" podUID="ac679fab-6266-466a-afb9-62d9c95cebb7" May 13 00:45:41.866289 systemd[1]: Started sshd@8-10.0.0.89:22-10.0.0.1:37022.service. May 13 00:45:41.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:37022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:41.867413 kernel: kauditd_printk_skb: 51 callbacks suppressed May 13 00:45:41.867484 kernel: audit: type=1130 audit(1747097141.865:1009): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:37022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:41.910000 audit[3154]: USER_ACCT pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:41.912412 sshd[3154]: Accepted publickey for core from 10.0.0.1 port 37022 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:45:41.914758 sshd[3154]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:41.912000 audit[3154]: CRED_ACQ pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:41.919491 systemd-logind[1188]: New session 9 of user core. May 13 00:45:41.920246 systemd[1]: Started session-9.scope. May 13 00:45:41.920476 kernel: audit: type=1101 audit(1747097141.910:1010): pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:41.920537 kernel: audit: type=1103 audit(1747097141.912:1011): pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:41.920576 kernel: audit: type=1006 audit(1747097141.912:1012): pid=3154 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 13 00:45:41.912000 audit[3154]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd2eaac80 a2=3 a3=0 items=0 ppid=1 pid=3154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:41.926895 kernel: audit: type=1300 audit(1747097141.912:1012): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd2eaac80 a2=3 a3=0 items=0 ppid=1 pid=3154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:41.912000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:41.928501 kernel: audit: type=1327 audit(1747097141.912:1012): proctitle=737368643A20636F7265205B707269765D May 13 00:45:41.928540 kernel: audit: type=1105 audit(1747097141.924:1013): pid=3154 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:41.924000 audit[3154]: USER_START pid=3154 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:41.932687 kernel: audit: type=1103 audit(1747097141.926:1014): pid=3156 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:41.926000 audit[3156]: CRED_ACQ pid=3156 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:42.043566 sshd[3154]: pam_unix(sshd:session): session closed for user core May 13 00:45:42.043000 audit[3154]: USER_END pid=3154 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:42.046582 systemd[1]: sshd@8-10.0.0.89:22-10.0.0.1:37022.service: Deactivated successfully. May 13 00:45:42.047390 systemd[1]: session-9.scope: Deactivated successfully. May 13 00:45:42.048058 systemd-logind[1188]: Session 9 logged out. Waiting for processes to exit. May 13 00:45:42.048780 systemd-logind[1188]: Removed session 9. May 13 00:45:42.043000 audit[3154]: CRED_DISP pid=3154 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:42.054025 kernel: audit: type=1106 audit(1747097142.043:1015): pid=3154 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:42.054077 kernel: audit: type=1104 audit(1747097142.043:1016): pid=3154 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:42.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:37022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:42.261177 systemd[1]: Created slice kubepods-besteffort-podcc4ea95c_a97c_4a6c_92c7_f7420431f01f.slice. May 13 00:45:42.262798 env[1198]: time="2025-05-13T00:45:42.262767348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qt7kw,Uid:cc4ea95c-a97c-4a6c-92c7-f7420431f01f,Namespace:calico-system,Attempt:0,}" May 13 00:45:42.324509 env[1198]: time="2025-05-13T00:45:42.324444022Z" level=error msg="Failed to destroy network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:42.324891 env[1198]: time="2025-05-13T00:45:42.324845507Z" level=error msg="encountered an error cleaning up failed sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:42.324947 env[1198]: time="2025-05-13T00:45:42.324919095Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qt7kw,Uid:cc4ea95c-a97c-4a6c-92c7-f7420431f01f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:42.325172 kubelet[1943]: E0513 00:45:42.325130 1943 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:42.325557 kubelet[1943]: E0513 00:45:42.325199 1943 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qt7kw" May 13 00:45:42.325557 kubelet[1943]: E0513 00:45:42.325225 1943 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qt7kw" May 13 00:45:42.325557 kubelet[1943]: E0513 00:45:42.325271 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qt7kw_calico-system(cc4ea95c-a97c-4a6c-92c7-f7420431f01f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qt7kw_calico-system(cc4ea95c-a97c-4a6c-92c7-f7420431f01f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:42.326518 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2-shm.mount: Deactivated successfully. May 13 00:45:42.513575 kubelet[1943]: I0513 00:45:42.513458 1943 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:45:42.514062 env[1198]: time="2025-05-13T00:45:42.514020003Z" level=info msg="StopPodSandbox for \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\"" May 13 00:45:42.539952 env[1198]: time="2025-05-13T00:45:42.539862119Z" level=error msg="StopPodSandbox for \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\" failed" error="failed to destroy network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:42.540236 kubelet[1943]: E0513 00:45:42.540155 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:45:42.540236 kubelet[1943]: E0513 00:45:42.540227 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2"} May 13 00:45:42.540353 kubelet[1943]: E0513 00:45:42.540271 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc4ea95c-a97c-4a6c-92c7-f7420431f01f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:42.540353 kubelet[1943]: E0513 00:45:42.540304 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc4ea95c-a97c-4a6c-92c7-f7420431f01f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qt7kw" podUID="cc4ea95c-a97c-4a6c-92c7-f7420431f01f" May 13 00:45:47.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:34378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:47.050589 systemd[1]: Started sshd@9-10.0.0.89:22-10.0.0.1:34378.service. May 13 00:45:47.060455 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:45:47.060516 kernel: audit: type=1130 audit(1747097147.049:1018): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:34378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:47.105000 audit[3230]: USER_ACCT pid=3230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.107357 sshd[3230]: Accepted publickey for core from 10.0.0.1 port 34378 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:45:47.113380 kernel: audit: type=1101 audit(1747097147.105:1019): pid=3230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.112000 audit[3230]: CRED_ACQ pid=3230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.114605 sshd[3230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:47.123030 systemd[1]: Started session-10.scope. May 13 00:45:47.123497 systemd-logind[1188]: New session 10 of user core. May 13 00:45:47.124482 kernel: audit: type=1103 audit(1747097147.112:1020): pid=3230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.133612 kernel: audit: type=1006 audit(1747097147.112:1021): pid=3230 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 00:45:47.133677 kernel: audit: type=1300 audit(1747097147.112:1021): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff00f5ce40 a2=3 a3=0 items=0 ppid=1 pid=3230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:47.112000 audit[3230]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff00f5ce40 a2=3 a3=0 items=0 ppid=1 pid=3230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:47.112000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:47.140123 kernel: audit: type=1327 audit(1747097147.112:1021): proctitle=737368643A20636F7265205B707269765D May 13 00:45:47.129000 audit[3230]: USER_START pid=3230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.162901 kernel: audit: type=1105 audit(1747097147.129:1022): pid=3230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.163009 kernel: audit: type=1103 audit(1747097147.130:1023): pid=3232 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.130000 audit[3232]: CRED_ACQ pid=3232 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.283015 sshd[3230]: pam_unix(sshd:session): session closed for user core May 13 00:45:47.282000 audit[3230]: USER_END pid=3230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.282000 audit[3230]: CRED_DISP pid=3230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.285081 systemd[1]: sshd@9-10.0.0.89:22-10.0.0.1:34378.service: Deactivated successfully. May 13 00:45:47.285719 systemd[1]: session-10.scope: Deactivated successfully. May 13 00:45:47.286535 systemd-logind[1188]: Session 10 logged out. Waiting for processes to exit. May 13 00:45:47.287379 systemd-logind[1188]: Removed session 10. May 13 00:45:47.292480 kernel: audit: type=1106 audit(1747097147.282:1024): pid=3230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.297295 kernel: audit: type=1104 audit(1747097147.282:1025): pid=3230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:47.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:34378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:51.527695 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1106358873.mount: Deactivated successfully. May 13 00:45:52.258203 env[1198]: time="2025-05-13T00:45:52.258156632Z" level=info msg="StopPodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\"" May 13 00:45:52.287389 systemd[1]: Started sshd@10-10.0.0.89:22-10.0.0.1:34382.service. May 13 00:45:52.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.89:22-10.0.0.1:34382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:52.291718 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:45:52.291871 kernel: audit: type=1130 audit(1747097152.286:1027): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.89:22-10.0.0.1:34382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:53.040987 env[1198]: time="2025-05-13T00:45:53.040936204Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:53.042980 env[1198]: time="2025-05-13T00:45:53.042934592Z" level=error msg="StopPodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\" failed" error="failed to destroy network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:53.043408 kubelet[1943]: E0513 00:45:53.043346 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:45:53.043408 kubelet[1943]: E0513 00:45:53.043413 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0"} May 13 00:45:53.043793 kubelet[1943]: E0513 00:45:53.043451 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"873ef155-f7ef-4d06-a3e2-7be850c7a3ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:53.043793 kubelet[1943]: E0513 00:45:53.043479 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"873ef155-f7ef-4d06-a3e2-7be850c7a3ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-wptff" podUID="873ef155-f7ef-4d06-a3e2-7be850c7a3ec" May 13 00:45:53.044269 env[1198]: time="2025-05-13T00:45:53.044239335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:53.045652 env[1198]: time="2025-05-13T00:45:53.045608279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:53.047343 env[1198]: time="2025-05-13T00:45:53.047323465Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:53.047741 env[1198]: time="2025-05-13T00:45:53.047696405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 00:45:53.058648 env[1198]: time="2025-05-13T00:45:53.057990071Z" level=info msg="CreateContainer within sandbox \"e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:45:53.066000 audit[3264]: USER_ACCT pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.068408 sshd[3264]: Accepted publickey for core from 10.0.0.1 port 34382 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:45:53.073774 kernel: audit: type=1101 audit(1747097153.066:1028): pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.073497 sshd[3264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:53.071000 audit[3264]: CRED_ACQ pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.080417 kernel: audit: type=1103 audit(1747097153.071:1029): pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.080494 kernel: audit: type=1006 audit(1747097153.071:1030): pid=3264 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 13 00:45:53.080519 kernel: audit: type=1300 audit(1747097153.071:1030): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce7f77320 a2=3 a3=0 items=0 ppid=1 pid=3264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.071000 audit[3264]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce7f77320 a2=3 a3=0 items=0 ppid=1 pid=3264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.080750 systemd-logind[1188]: New session 11 of user core. May 13 00:45:53.081250 systemd[1]: Started session-11.scope. May 13 00:45:53.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:53.086102 kernel: audit: type=1327 audit(1747097153.071:1030): proctitle=737368643A20636F7265205B707269765D May 13 00:45:53.086160 kernel: audit: type=1105 audit(1747097153.084:1031): pid=3264 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.084000 audit[3264]: USER_START pid=3264 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.087291 env[1198]: time="2025-05-13T00:45:53.087240308Z" level=info msg="CreateContainer within sandbox \"e24eb5ffdff5e10b1fc1a68428a5d96487ec3d12b6e3b6d4a1f646c00065fd71\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"42ecb34cc2ed781b81aad967e96cb68feefd6b6f2b696f17a907fbba9a24242b\"" May 13 00:45:53.088061 env[1198]: time="2025-05-13T00:45:53.088013422Z" level=info msg="StartContainer for \"42ecb34cc2ed781b81aad967e96cb68feefd6b6f2b696f17a907fbba9a24242b\"" May 13 00:45:53.086000 audit[3274]: CRED_ACQ pid=3274 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.094298 kernel: audit: type=1103 audit(1747097153.086:1032): pid=3274 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.105250 systemd[1]: Started cri-containerd-42ecb34cc2ed781b81aad967e96cb68feefd6b6f2b696f17a907fbba9a24242b.scope. May 13 00:45:53.122000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f5fb4b7c9f8 items=0 ppid=2449 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.131963 kernel: audit: type=1400 audit(1747097153.122:1033): avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.132050 kernel: audit: type=1300 audit(1747097153.122:1033): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f5fb4b7c9f8 items=0 ppid=2449 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656362333463633265643738316238316161643936376539366362 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.122000 audit: BPF prog-id=136 op=LOAD May 13 00:45:53.122000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000259ba8 items=0 ppid=2449 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656362333463633265643738316238316161643936376539366362 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit: BPF prog-id=137 op=LOAD May 13 00:45:53.130000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000259bf8 items=0 ppid=2449 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656362333463633265643738316238316161643936376539366362 May 13 00:45:53.130000 audit: BPF prog-id=137 op=UNLOAD May 13 00:45:53.130000 audit: BPF prog-id=136 op=UNLOAD May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:53.130000 audit: BPF prog-id=138 op=LOAD May 13 00:45:53.130000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000259c88 items=0 ppid=2449 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432656362333463633265643738316238316161643936376539366362 May 13 00:45:53.150236 env[1198]: time="2025-05-13T00:45:53.150178728Z" level=info msg="StartContainer for \"42ecb34cc2ed781b81aad967e96cb68feefd6b6f2b696f17a907fbba9a24242b\" returns successfully" May 13 00:45:53.201000 audit[3264]: USER_END pid=3264 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.202000 audit[3264]: CRED_DISP pid=3264 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.202479 sshd[3264]: pam_unix(sshd:session): session closed for user core May 13 00:45:53.207093 systemd[1]: sshd@10-10.0.0.89:22-10.0.0.1:34382.service: Deactivated successfully. May 13 00:45:53.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.89:22-10.0.0.1:34382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:53.207624 systemd[1]: session-11.scope: Deactivated successfully. May 13 00:45:53.208526 systemd-logind[1188]: Session 11 logged out. Waiting for processes to exit. May 13 00:45:53.209706 systemd[1]: Started sshd@11-10.0.0.89:22-10.0.0.1:34390.service. May 13 00:45:53.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.89:22-10.0.0.1:34390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:53.210914 systemd-logind[1188]: Removed session 11. May 13 00:45:53.230110 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:45:53.230191 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:45:53.246000 audit[3328]: USER_ACCT pid=3328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.248565 sshd[3328]: Accepted publickey for core from 10.0.0.1 port 34390 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:45:53.249918 sshd[3328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:53.248000 audit[3328]: CRED_ACQ pid=3328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.248000 audit[3328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3e0d4e0 a2=3 a3=0 items=0 ppid=1 pid=3328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.248000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:53.254113 systemd[1]: Started session-12.scope. May 13 00:45:53.254355 systemd-logind[1188]: New session 12 of user core. May 13 00:45:53.256882 env[1198]: time="2025-05-13T00:45:53.256852322Z" level=info msg="StopPodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\"" May 13 00:45:53.259175 env[1198]: time="2025-05-13T00:45:53.259133862Z" level=info msg="StopPodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\"" May 13 00:45:53.258000 audit[3328]: USER_START pid=3328 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.260000 audit[3339]: CRED_ACQ pid=3339 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.286064 env[1198]: time="2025-05-13T00:45:53.286003043Z" level=error msg="StopPodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\" failed" error="failed to destroy network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:53.286268 kubelet[1943]: E0513 00:45:53.286215 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:45:53.286328 kubelet[1943]: E0513 00:45:53.286271 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425"} May 13 00:45:53.286328 kubelet[1943]: E0513 00:45:53.286309 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c2f71248-d833-4bac-99fb-c72ed63f199e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:53.286441 kubelet[1943]: E0513 00:45:53.286331 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c2f71248-d833-4bac-99fb-c72ed63f199e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d557d699b-thb6g" podUID="c2f71248-d833-4bac-99fb-c72ed63f199e" May 13 00:45:53.289819 env[1198]: time="2025-05-13T00:45:53.289764315Z" level=error msg="StopPodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\" failed" error="failed to destroy network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:45:53.289993 kubelet[1943]: E0513 00:45:53.289895 1943 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:45:53.289993 kubelet[1943]: E0513 00:45:53.289932 1943 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14"} May 13 00:45:53.289993 kubelet[1943]: E0513 00:45:53.289959 1943 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"53bc8e8a-8278-4145-89d0-64d17addf6bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:45:53.289993 kubelet[1943]: E0513 00:45:53.289976 1943 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"53bc8e8a-8278-4145-89d0-64d17addf6bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6b8658597f-c8g2s" podUID="53bc8e8a-8278-4145-89d0-64d17addf6bd" May 13 00:45:53.409920 sshd[3328]: pam_unix(sshd:session): session closed for user core May 13 00:45:53.410000 audit[3328]: USER_END pid=3328 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.410000 audit[3328]: CRED_DISP pid=3328 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.89:22-10.0.0.1:34394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:53.414057 systemd[1]: Started sshd@12-10.0.0.89:22-10.0.0.1:34394.service. May 13 00:45:53.414476 systemd[1]: sshd@11-10.0.0.89:22-10.0.0.1:34390.service: Deactivated successfully. May 13 00:45:53.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.89:22-10.0.0.1:34390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:53.416257 systemd[1]: session-12.scope: Deactivated successfully. May 13 00:45:53.417057 systemd-logind[1188]: Session 12 logged out. Waiting for processes to exit. May 13 00:45:53.417990 systemd-logind[1188]: Removed session 12. May 13 00:45:53.458000 audit[3400]: USER_ACCT pid=3400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.459662 sshd[3400]: Accepted publickey for core from 10.0.0.1 port 34394 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:45:53.458000 audit[3400]: CRED_ACQ pid=3400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.459000 audit[3400]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5d32be50 a2=3 a3=0 items=0 ppid=1 pid=3400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:53.459000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:53.460662 sshd[3400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:53.463960 systemd-logind[1188]: New session 13 of user core. May 13 00:45:53.464627 systemd[1]: Started session-13.scope. May 13 00:45:53.466000 audit[3400]: USER_START pid=3400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.467000 audit[3403]: CRED_ACQ pid=3403 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.572032 sshd[3400]: pam_unix(sshd:session): session closed for user core May 13 00:45:53.571000 audit[3400]: USER_END pid=3400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.571000 audit[3400]: CRED_DISP pid=3400 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:53.574453 systemd[1]: sshd@12-10.0.0.89:22-10.0.0.1:34394.service: Deactivated successfully. May 13 00:45:53.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.89:22-10.0.0.1:34394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:53.575113 systemd[1]: session-13.scope: Deactivated successfully. May 13 00:45:53.575738 systemd-logind[1188]: Session 13 logged out. Waiting for processes to exit. May 13 00:45:53.576340 systemd-logind[1188]: Removed session 13. May 13 00:45:54.022507 kubelet[1943]: E0513 00:45:54.022474 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:54.035993 kubelet[1943]: I0513 00:45:54.035931 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-bdck9" podStartSLOduration=2.166161026 podStartE2EDuration="29.035906371s" podCreationTimestamp="2025-05-13 00:45:25 +0000 UTC" firstStartedPulling="2025-05-13 00:45:26.178732139 +0000 UTC m=+14.014131536" lastFinishedPulling="2025-05-13 00:45:53.048477484 +0000 UTC m=+40.883876881" observedRunningTime="2025-05-13 00:45:54.035011408 +0000 UTC m=+41.870410795" watchObservedRunningTime="2025-05-13 00:45:54.035906371 +0000 UTC m=+41.871305768" May 13 00:45:54.256937 env[1198]: time="2025-05-13T00:45:54.256897853Z" level=info msg="StopPodSandbox for \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\"" May 13 00:45:54.257477 env[1198]: time="2025-05-13T00:45:54.256909626Z" level=info msg="StopPodSandbox for \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\"" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.300 [INFO][3480] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.300 [INFO][3480] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" iface="eth0" netns="/var/run/netns/cni-793619af-dac1-5c8d-004d-f1824970750b" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.301 [INFO][3480] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" iface="eth0" netns="/var/run/netns/cni-793619af-dac1-5c8d-004d-f1824970750b" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.302 [INFO][3480] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" iface="eth0" netns="/var/run/netns/cni-793619af-dac1-5c8d-004d-f1824970750b" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.302 [INFO][3480] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.302 [INFO][3480] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.344 [INFO][3495] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.345 [INFO][3495] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.345 [INFO][3495] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.352 [WARNING][3495] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.352 [INFO][3495] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.354 [INFO][3495] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:54.357537 env[1198]: 2025-05-13 00:45:54.356 [INFO][3480] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:45:54.358475 env[1198]: time="2025-05-13T00:45:54.357656848Z" level=info msg="TearDown network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\" successfully" May 13 00:45:54.358475 env[1198]: time="2025-05-13T00:45:54.357702894Z" level=info msg="StopPodSandbox for \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\" returns successfully" May 13 00:45:54.358547 env[1198]: time="2025-05-13T00:45:54.358474605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58ccc857f4-5zdsn,Uid:087c8e13-074f-4fde-b3bf-565afc56de3e,Namespace:calico-apiserver,Attempt:1,}" May 13 00:45:54.359627 systemd[1]: run-netns-cni\x2d793619af\x2ddac1\x2d5c8d\x2d004d\x2df1824970750b.mount: Deactivated successfully. May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.302 [INFO][3479] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.302 [INFO][3479] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" iface="eth0" netns="/var/run/netns/cni-44903e8a-c34b-50db-4613-0502dcec77a7" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.302 [INFO][3479] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" iface="eth0" netns="/var/run/netns/cni-44903e8a-c34b-50db-4613-0502dcec77a7" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.302 [INFO][3479] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" iface="eth0" netns="/var/run/netns/cni-44903e8a-c34b-50db-4613-0502dcec77a7" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.302 [INFO][3479] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.302 [INFO][3479] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.345 [INFO][3497] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.345 [INFO][3497] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.354 [INFO][3497] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.362 [WARNING][3497] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.362 [INFO][3497] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.364 [INFO][3497] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:54.367144 env[1198]: 2025-05-13 00:45:54.365 [INFO][3479] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:45:54.367706 env[1198]: time="2025-05-13T00:45:54.367287264Z" level=info msg="TearDown network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\" successfully" May 13 00:45:54.367706 env[1198]: time="2025-05-13T00:45:54.367321358Z" level=info msg="StopPodSandbox for \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\" returns successfully" May 13 00:45:54.367775 kubelet[1943]: E0513 00:45:54.367635 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:54.369092 env[1198]: time="2025-05-13T00:45:54.369037977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qgl96,Uid:e28234ba-dcea-49e7-8e00-9577ae7d87d2,Namespace:kube-system,Attempt:1,}" May 13 00:45:54.371799 systemd[1]: run-netns-cni\x2d44903e8a\x2dc34b\x2d50db\x2d4613\x2d0502dcec77a7.mount: Deactivated successfully. May 13 00:45:54.565000 audit[3563]: AVC avc: denied { write } for pid=3563 comm="tee" name="fd" dev="proc" ino=24221 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:45:54.565000 audit[3563]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffd5f7a2a a2=241 a3=1b6 items=1 ppid=3528 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.565000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:45:54.565000 audit: PATH item=0 name="/dev/fd/63" inode=24213 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:54.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:45:54.567000 audit[3555]: AVC avc: denied { write } for pid=3555 comm="tee" name="fd" dev="proc" ino=24230 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:45:54.567000 audit[3555]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffba2b9a1a a2=241 a3=1b6 items=1 ppid=3525 pid=3555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.567000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:45:54.567000 audit: PATH item=0 name="/dev/fd/63" inode=24210 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:54.567000 audit[3566]: AVC avc: denied { write } for pid=3566 comm="tee" name="fd" dev="proc" ino=25041 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:45:54.567000 audit[3566]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd206baa2c a2=241 a3=1b6 items=1 ppid=3524 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.567000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:45:54.567000 audit: PATH item=0 name="/dev/fd/63" inode=24216 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:54.567000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:45:54.567000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:45:54.570000 audit[3574]: AVC avc: denied { write } for pid=3574 comm="tee" name="fd" dev="proc" ino=26852 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:45:54.570000 audit[3574]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc81c0ca2a a2=241 a3=1b6 items=1 ppid=3530 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.570000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:45:54.570000 audit: PATH item=0 name="/dev/fd/63" inode=25038 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:54.570000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:45:54.574000 audit[3588]: AVC avc: denied { write } for pid=3588 comm="tee" name="fd" dev="proc" ino=26856 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:45:54.574000 audit[3588]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed105ba1b a2=241 a3=1b6 items=1 ppid=3521 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.574000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:45:54.574000 audit: PATH item=0 name="/dev/fd/63" inode=24226 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:54.574000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:45:54.590000 audit[3593]: AVC avc: denied { write } for pid=3593 comm="tee" name="fd" dev="proc" ino=26067 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:45:54.590000 audit[3593]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd927ea2b a2=241 a3=1b6 items=1 ppid=3523 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.590000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:45:54.590000 audit: PATH item=0 name="/dev/fd/63" inode=25045 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:54.590000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:45:54.592000 audit[3586]: AVC avc: denied { write } for pid=3586 comm="tee" name="fd" dev="proc" ino=24235 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:45:54.592000 audit[3586]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4eaeda2a a2=241 a3=1b6 items=1 ppid=3522 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.592000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:45:54.592000 audit: PATH item=0 name="/dev/fd/63" inode=26849 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:45:54.592000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit: BPF prog-id=139 op=LOAD May 13 00:45:54.715000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0c3f8970 a2=98 a3=3 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.715000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.715000 audit: BPF prog-id=139 op=UNLOAD May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit: BPF prog-id=140 op=LOAD May 13 00:45:54.715000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd0c3f8750 a2=74 a3=540051 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.715000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.715000 audit: BPF prog-id=140 op=UNLOAD May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.715000 audit: BPF prog-id=141 op=LOAD May 13 00:45:54.715000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd0c3f8780 a2=94 a3=2 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.715000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.715000 audit: BPF prog-id=141 op=UNLOAD May 13 00:45:54.780444 systemd-networkd[1023]: calieeb4dd87528: Link UP May 13 00:45:54.783079 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:45:54.783190 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieeb4dd87528: link becomes ready May 13 00:45:54.783167 systemd-networkd[1023]: calieeb4dd87528: Gained carrier May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.676 [INFO][3615] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.694 [INFO][3615] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--qgl96-eth0 coredns-668d6bf9bc- kube-system e28234ba-dcea-49e7-8e00-9577ae7d87d2 890 0 2025-05-13 00:45:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-qgl96 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calieeb4dd87528 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Namespace="kube-system" Pod="coredns-668d6bf9bc-qgl96" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qgl96-" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.694 [INFO][3615] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Namespace="kube-system" Pod="coredns-668d6bf9bc-qgl96" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.730 [INFO][3660] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" HandleID="k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.739 [INFO][3660] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" HandleID="k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000368ac0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-qgl96", "timestamp":"2025-05-13 00:45:54.730196858 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.739 [INFO][3660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.739 [INFO][3660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.739 [INFO][3660] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.741 [INFO][3660] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.748 [INFO][3660] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.752 [INFO][3660] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.754 [INFO][3660] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.755 [INFO][3660] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.755 [INFO][3660] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.756 [INFO][3660] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487 May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.760 [INFO][3660] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.763 [INFO][3660] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.763 [INFO][3660] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" host="localhost" May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.763 [INFO][3660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:54.797634 env[1198]: 2025-05-13 00:45:54.763 [INFO][3660] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" HandleID="k8s-pod-network.aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.798444 env[1198]: 2025-05-13 00:45:54.766 [INFO][3615] cni-plugin/k8s.go 386: Populated endpoint ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Namespace="kube-system" Pod="coredns-668d6bf9bc-qgl96" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qgl96-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e28234ba-dcea-49e7-8e00-9577ae7d87d2", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-qgl96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieeb4dd87528", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:54.798444 env[1198]: 2025-05-13 00:45:54.766 [INFO][3615] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Namespace="kube-system" Pod="coredns-668d6bf9bc-qgl96" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.798444 env[1198]: 2025-05-13 00:45:54.766 [INFO][3615] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calieeb4dd87528 ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Namespace="kube-system" Pod="coredns-668d6bf9bc-qgl96" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.798444 env[1198]: 2025-05-13 00:45:54.783 [INFO][3615] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Namespace="kube-system" Pod="coredns-668d6bf9bc-qgl96" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.798444 env[1198]: 2025-05-13 00:45:54.783 [INFO][3615] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Namespace="kube-system" Pod="coredns-668d6bf9bc-qgl96" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qgl96-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e28234ba-dcea-49e7-8e00-9577ae7d87d2", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487", Pod:"coredns-668d6bf9bc-qgl96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieeb4dd87528", MAC:"16:11:65:e5:0b:ad", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:54.798444 env[1198]: 2025-05-13 00:45:54.793 [INFO][3615] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487" Namespace="kube-system" Pod="coredns-668d6bf9bc-qgl96" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:45:54.815012 env[1198]: time="2025-05-13T00:45:54.814937795Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:54.815012 env[1198]: time="2025-05-13T00:45:54.814999491Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:54.815119 env[1198]: time="2025-05-13T00:45:54.815012906Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:54.815264 env[1198]: time="2025-05-13T00:45:54.815206741Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487 pid=3704 runtime=io.containerd.runc.v2 May 13 00:45:54.826130 systemd[1]: Started cri-containerd-aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487.scope. May 13 00:45:54.831000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit: BPF prog-id=142 op=LOAD May 13 00:45:54.831000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd0c3f8640 a2=40 a3=1 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.831000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.831000 audit: BPF prog-id=142 op=UNLOAD May 13 00:45:54.831000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.831000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd0c3f8710 a2=50 a3=7ffd0c3f87f0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.831000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit: BPF prog-id=143 op=LOAD May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3704 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613733343932666638383738386333353761356563386139623336 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3704 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613733343932666638383738386333353761356563386139623336 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit: BPF prog-id=144 op=LOAD May 13 00:45:54.836000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000af000 items=0 ppid=3704 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613733343932666638383738386333353761356563386139623336 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit: BPF prog-id=145 op=LOAD May 13 00:45:54.836000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000af048 items=0 ppid=3704 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613733343932666638383738386333353761356563386139623336 May 13 00:45:54.836000 audit: BPF prog-id=145 op=UNLOAD May 13 00:45:54.836000 audit: BPF prog-id=144 op=UNLOAD May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { perfmon } for pid=3716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit[3716]: AVC avc: denied { bpf } for pid=3716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.836000 audit: BPF prog-id=146 op=LOAD May 13 00:45:54.836000 audit[3716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000af458 items=0 ppid=3704 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163613733343932666638383738386333353761356563386139623336 May 13 00:45:54.838725 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0c3f8650 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0c3f8680 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0c3f8590 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0c3f86a0 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0c3f8680 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0c3f8670 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0c3f86a0 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0c3f8680 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0c3f86a0 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0c3f8670 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0c3f86e0 a2=28 a3=0 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd0c3f8490 a2=50 a3=1 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit: BPF prog-id=147 op=LOAD May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd0c3f8490 a2=94 a3=5 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit: BPF prog-id=147 op=UNLOAD May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd0c3f8540 a2=50 a3=1 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd0c3f8660 a2=4 a3=38 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.839000 audit[3681]: AVC avc: denied { confidentiality } for pid=3681 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:54.839000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd0c3f86b0 a2=94 a3=6 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.840000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { confidentiality } for pid=3681 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:54.840000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd0c3f7e60 a2=94 a3=83 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.840000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.840000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.840000 audit[3681]: AVC avc: denied { confidentiality } for pid=3681 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:54.840000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd0c3f7e60 a2=94 a3=83 items=0 ppid=3540 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.840000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit: BPF prog-id=148 op=LOAD May 13 00:45:54.851000 audit[3734]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5441d630 a2=98 a3=1999999999999999 items=0 ppid=3540 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.851000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:45:54.851000 audit: BPF prog-id=148 op=UNLOAD May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit: BPF prog-id=149 op=LOAD May 13 00:45:54.851000 audit[3734]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5441d510 a2=74 a3=ffff items=0 ppid=3540 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.851000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:45:54.851000 audit: BPF prog-id=149 op=UNLOAD May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.851000 audit: BPF prog-id=150 op=LOAD May 13 00:45:54.851000 audit[3734]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5441d550 a2=40 a3=7ffe5441d730 items=0 ppid=3540 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.851000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:45:54.851000 audit: BPF prog-id=150 op=UNLOAD May 13 00:45:54.865593 env[1198]: time="2025-05-13T00:45:54.865546287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qgl96,Uid:e28234ba-dcea-49e7-8e00-9577ae7d87d2,Namespace:kube-system,Attempt:1,} returns sandbox id \"aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487\"" May 13 00:45:54.866290 kubelet[1943]: E0513 00:45:54.866256 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:54.871734 systemd-networkd[1023]: cali62ff2a22767: Link UP May 13 00:45:54.873054 systemd-networkd[1023]: cali62ff2a22767: Gained carrier May 13 00:45:54.873437 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali62ff2a22767: link becomes ready May 13 00:45:54.873721 env[1198]: time="2025-05-13T00:45:54.873689208Z" level=info msg="CreateContainer within sandbox \"aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.677 [INFO][3606] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.700 [INFO][3606] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0 calico-apiserver-58ccc857f4- calico-apiserver 087c8e13-074f-4fde-b3bf-565afc56de3e 889 0 2025-05-13 00:45:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58ccc857f4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-58ccc857f4-5zdsn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali62ff2a22767 [] []}} ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-5zdsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.700 [INFO][3606] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-5zdsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.741 [INFO][3666] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" HandleID="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.753 [INFO][3666] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" HandleID="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000583820), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-58ccc857f4-5zdsn", "timestamp":"2025-05-13 00:45:54.741390564 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.753 [INFO][3666] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.764 [INFO][3666] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.764 [INFO][3666] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.843 [INFO][3666] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.849 [INFO][3666] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.853 [INFO][3666] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.854 [INFO][3666] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.856 [INFO][3666] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.856 [INFO][3666] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.857 [INFO][3666] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71 May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.860 [INFO][3666] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.865 [INFO][3666] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.865 [INFO][3666] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" host="localhost" May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.865 [INFO][3666] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:54.883294 env[1198]: 2025-05-13 00:45:54.865 [INFO][3666] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" HandleID="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.884135 env[1198]: 2025-05-13 00:45:54.868 [INFO][3606] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-5zdsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0", GenerateName:"calico-apiserver-58ccc857f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"087c8e13-074f-4fde-b3bf-565afc56de3e", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58ccc857f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-58ccc857f4-5zdsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali62ff2a22767", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:54.884135 env[1198]: 2025-05-13 00:45:54.868 [INFO][3606] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-5zdsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.884135 env[1198]: 2025-05-13 00:45:54.868 [INFO][3606] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali62ff2a22767 ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-5zdsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.884135 env[1198]: 2025-05-13 00:45:54.873 [INFO][3606] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-5zdsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.884135 env[1198]: 2025-05-13 00:45:54.873 [INFO][3606] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-5zdsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0", GenerateName:"calico-apiserver-58ccc857f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"087c8e13-074f-4fde-b3bf-565afc56de3e", ResourceVersion:"889", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58ccc857f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71", Pod:"calico-apiserver-58ccc857f4-5zdsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali62ff2a22767", MAC:"ea:6e:c4:8f:89:a8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:54.884135 env[1198]: 2025-05-13 00:45:54.880 [INFO][3606] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-5zdsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:45:54.896541 env[1198]: time="2025-05-13T00:45:54.896490308Z" level=info msg="CreateContainer within sandbox \"aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"484595a5a553572220d8b058da4f741a770faa768b1ca42c03e6a60266ba638f\"" May 13 00:45:54.897403 env[1198]: time="2025-05-13T00:45:54.897191716Z" level=info msg="StartContainer for \"484595a5a553572220d8b058da4f741a770faa768b1ca42c03e6a60266ba638f\"" May 13 00:45:54.898534 env[1198]: time="2025-05-13T00:45:54.898309308Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:54.898534 env[1198]: time="2025-05-13T00:45:54.898353151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:54.898534 env[1198]: time="2025-05-13T00:45:54.898375843Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:54.898780 env[1198]: time="2025-05-13T00:45:54.898725511Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71 pid=3774 runtime=io.containerd.runc.v2 May 13 00:45:54.910629 systemd[1]: Started cri-containerd-0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71.scope. May 13 00:45:54.919264 systemd[1]: Started cri-containerd-484595a5a553572220d8b058da4f741a770faa768b1ca42c03e6a60266ba638f.scope. May 13 00:45:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.924000 audit: BPF prog-id=151 op=LOAD May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3774 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366164616462343064316364653633666465363261656562656435 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3774 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366164616462343064316364653633666465363261656562656435 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit: BPF prog-id=152 op=LOAD May 13 00:45:54.925000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c3120 items=0 ppid=3774 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366164616462343064316364653633666465363261656562656435 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit: BPF prog-id=153 op=LOAD May 13 00:45:54.925000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c3168 items=0 ppid=3774 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366164616462343064316364653633666465363261656562656435 May 13 00:45:54.925000 audit: BPF prog-id=153 op=UNLOAD May 13 00:45:54.925000 audit: BPF prog-id=152 op=UNLOAD May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.925000 audit: BPF prog-id=154 op=LOAD May 13 00:45:54.925000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c3578 items=0 ppid=3774 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061366164616462343064316364653633666465363261656562656435 May 13 00:45:54.929565 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:45:54.931756 systemd-networkd[1023]: vxlan.calico: Link UP May 13 00:45:54.931764 systemd-networkd[1023]: vxlan.calico: Gained carrier May 13 00:45:54.950000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit: BPF prog-id=155 op=LOAD May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3704 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343539356135613535333537323232306438623035386461346637 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3704 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343539356135613535333537323232306438623035386461346637 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit: BPF prog-id=156 op=LOAD May 13 00:45:54.951000 audit[3797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028b1b0 items=0 ppid=3704 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343539356135613535333537323232306438623035386461346637 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.951000 audit: BPF prog-id=157 op=LOAD May 13 00:45:54.951000 audit[3797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028b1f8 items=0 ppid=3704 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343539356135613535333537323232306438623035386461346637 May 13 00:45:54.951000 audit: BPF prog-id=157 op=UNLOAD May 13 00:45:54.951000 audit: BPF prog-id=156 op=UNLOAD May 13 00:45:54.952000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { perfmon } for pid=3797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.952000 audit: BPF prog-id=158 op=LOAD May 13 00:45:54.952000 audit[3797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028b608 items=0 ppid=3704 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343539356135613535333537323232306438623035386461346637 May 13 00:45:54.950000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.950000 audit: BPF prog-id=159 op=LOAD May 13 00:45:54.950000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffebc033d0 a2=98 a3=ffffffff items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.953000 audit: BPF prog-id=159 op=UNLOAD May 13 00:45:54.953000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.953000 audit: BPF prog-id=160 op=LOAD May 13 00:45:54.953000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffebc031e0 a2=74 a3=540051 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.954000 audit: BPF prog-id=160 op=UNLOAD May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit: BPF prog-id=161 op=LOAD May 13 00:45:54.954000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffebc03210 a2=94 a3=2 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.954000 audit: BPF prog-id=161 op=UNLOAD May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffebc030e0 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffebc03110 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffebc03020 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffebc03130 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffebc03110 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffebc03100 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.954000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.954000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffebc03130 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffebc03110 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffebc03130 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffebc03100 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffebc03170 a2=28 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.955000 audit: BPF prog-id=162 op=LOAD May 13 00:45:54.955000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffebc02fe0 a2=40 a3=0 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.956000 audit: BPF prog-id=162 op=UNLOAD May 13 00:45:54.957000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffebc02fd0 a2=50 a3=2800 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffebc02fd0 a2=50 a3=2800 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.957000 audit: BPF prog-id=163 op=LOAD May 13 00:45:54.957000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffebc027f0 a2=94 a3=2 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.958000 audit: BPF prog-id=163 op=UNLOAD May 13 00:45:54.958000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.958000 audit: BPF prog-id=164 op=LOAD May 13 00:45:54.958000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffebc028f0 a2=94 a3=30 items=0 ppid=3540 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:45:54.963108 env[1198]: time="2025-05-13T00:45:54.963034823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58ccc857f4-5zdsn,Uid:087c8e13-074f-4fde-b3bf-565afc56de3e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71\"" May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit: BPF prog-id=165 op=LOAD May 13 00:45:54.964000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec1911530 a2=98 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:54.964000 audit: BPF prog-id=165 op=UNLOAD May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit: BPF prog-id=166 op=LOAD May 13 00:45:54.964000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec1911310 a2=74 a3=540051 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:54.964000 audit: BPF prog-id=166 op=UNLOAD May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:54.964000 audit: BPF prog-id=167 op=LOAD May 13 00:45:54.964000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec1911340 a2=94 a3=2 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:54.964000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:54.964000 audit: BPF prog-id=167 op=UNLOAD May 13 00:45:54.978252 env[1198]: time="2025-05-13T00:45:54.978224973Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:45:54.983665 env[1198]: time="2025-05-13T00:45:54.983597284Z" level=info msg="StartContainer for \"484595a5a553572220d8b058da4f741a770faa768b1ca42c03e6a60266ba638f\" returns successfully" May 13 00:45:55.010000 audit[3823]: AVC avc: denied { getattr } for pid=3823 comm="coredns" path="cgroup:[4026532695]" dev="nsfs" ino=4026532695 scontext=system_u:system_r:svirt_lxc_net_t:s0:c252,c787 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 13 00:45:55.010000 audit[3823]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c900 a2=c00049d2e8 a3=0 items=0 ppid=3704 pid=3823 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c252,c787 key=(null) May 13 00:45:55.010000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 13 00:45:55.030242 kubelet[1943]: E0513 00:45:55.030200 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:55.030936 kubelet[1943]: E0513 00:45:55.030908 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:55.040902 kubelet[1943]: I0513 00:45:55.040849 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-qgl96" podStartSLOduration=37.040833144 podStartE2EDuration="37.040833144s" podCreationTimestamp="2025-05-13 00:45:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:45:55.040466666 +0000 UTC m=+42.875866063" watchObservedRunningTime="2025-05-13 00:45:55.040833144 +0000 UTC m=+42.876232531" May 13 00:45:55.051000 audit[3880]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:55.051000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd268b6850 a2=0 a3=7ffd268b683c items=0 ppid=2086 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:55.056000 audit[3880]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:55.056000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd268b6850 a2=0 a3=0 items=0 ppid=2086 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit: BPF prog-id=168 op=LOAD May 13 00:45:55.092000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec1911200 a2=40 a3=1 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.092000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.092000 audit: BPF prog-id=168 op=UNLOAD May 13 00:45:55.092000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.092000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec19112d0 a2=50 a3=7ffec19113b0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.092000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1911210 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1911240 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1911150 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1911260 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1911240 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1911230 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec1911260 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1911240 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1911260 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec1911230 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec19112a0 a2=28 a3=0 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec1911050 a2=50 a3=1 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.099000 audit: BPF prog-id=169 op=LOAD May 13 00:45:55.099000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec1911050 a2=94 a3=5 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.100000 audit: BPF prog-id=169 op=UNLOAD May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec1911100 a2=50 a3=1 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffec1911220 a2=4 a3=38 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { confidentiality } for pid=3858 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:55.100000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec1911270 a2=94 a3=6 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { confidentiality } for pid=3858 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:55.100000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec1910a20 a2=94 a3=83 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { confidentiality } for pid=3858 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:45:55.100000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec1910a20 a2=94 a3=83 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.100000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.100000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec1912460 a2=10 a3=208 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.100000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.101000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.101000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec1912300 a2=10 a3=3 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.101000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.101000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec19122a0 a2=10 a3=3 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.101000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.101000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec19122a0 a2=10 a3=7 items=0 ppid=3540 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.101000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:45:55.110000 audit: BPF prog-id=164 op=UNLOAD May 13 00:45:55.157000 audit[3920]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3920 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:45:55.157000 audit[3920]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff8df76550 a2=0 a3=7fff8df7653c items=0 ppid=3540 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.157000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:45:55.158000 audit[3921]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=3921 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:45:55.158000 audit[3921]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdf4d44ed0 a2=0 a3=7ffdf4d44ebc items=0 ppid=3540 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.158000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:45:55.162000 audit[3919]: NETFILTER_CFG table=raw:101 family=2 entries=21 op=nft_register_chain pid=3919 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:45:55.162000 audit[3919]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffeb2806d60 a2=0 a3=7ffeb2806d4c items=0 ppid=3540 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.162000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:45:55.165000 audit[3926]: NETFILTER_CFG table=filter:102 family=2 entries=105 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:45:55.165000 audit[3926]: SYSCALL arch=c000003e syscall=46 success=yes exit=58184 a0=3 a1=7ffda9df8390 a2=0 a3=7ffda9df837c items=0 ppid=3540 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.165000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:45:55.257172 env[1198]: time="2025-05-13T00:45:55.257048259Z" level=info msg="StopPodSandbox for \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\"" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.385 [INFO][3946] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.386 [INFO][3946] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" iface="eth0" netns="/var/run/netns/cni-04340dae-31aa-764a-a4b1-2fa380cdd205" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.386 [INFO][3946] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" iface="eth0" netns="/var/run/netns/cni-04340dae-31aa-764a-a4b1-2fa380cdd205" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.386 [INFO][3946] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" iface="eth0" netns="/var/run/netns/cni-04340dae-31aa-764a-a4b1-2fa380cdd205" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.386 [INFO][3946] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.386 [INFO][3946] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.406 [INFO][3955] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.406 [INFO][3955] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.406 [INFO][3955] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.414 [WARNING][3955] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.414 [INFO][3955] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.415 [INFO][3955] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:55.419267 env[1198]: 2025-05-13 00:45:55.417 [INFO][3946] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:45:55.420226 env[1198]: time="2025-05-13T00:45:55.420173931Z" level=info msg="TearDown network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\" successfully" May 13 00:45:55.420226 env[1198]: time="2025-05-13T00:45:55.420209869Z" level=info msg="StopPodSandbox for \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\" returns successfully" May 13 00:45:55.420987 env[1198]: time="2025-05-13T00:45:55.420940893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qt7kw,Uid:cc4ea95c-a97c-4a6c-92c7-f7420431f01f,Namespace:calico-system,Attempt:1,}" May 13 00:45:55.422332 systemd[1]: run-netns-cni\x2d04340dae\x2d31aa\x2d764a\x2da4b1\x2d2fa380cdd205.mount: Deactivated successfully. May 13 00:45:55.594673 systemd-networkd[1023]: calid5d0a32bbec: Link UP May 13 00:45:55.595987 systemd-networkd[1023]: calid5d0a32bbec: Gained carrier May 13 00:45:55.596477 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid5d0a32bbec: link becomes ready May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.525 [INFO][3962] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--qt7kw-eth0 csi-node-driver- calico-system cc4ea95c-a97c-4a6c-92c7-f7420431f01f 912 0 2025-05-13 00:45:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-qt7kw eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid5d0a32bbec [] []}} ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Namespace="calico-system" Pod="csi-node-driver-qt7kw" WorkloadEndpoint="localhost-k8s-csi--node--driver--qt7kw-" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.525 [INFO][3962] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Namespace="calico-system" Pod="csi-node-driver-qt7kw" WorkloadEndpoint="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.554 [INFO][3978] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" HandleID="k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.563 [INFO][3978] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" HandleID="k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042da10), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-qt7kw", "timestamp":"2025-05-13 00:45:55.554434253 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.563 [INFO][3978] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.563 [INFO][3978] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.563 [INFO][3978] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.566 [INFO][3978] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.570 [INFO][3978] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.575 [INFO][3978] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.576 [INFO][3978] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.578 [INFO][3978] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.578 [INFO][3978] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.580 [INFO][3978] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.583 [INFO][3978] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.590 [INFO][3978] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.590 [INFO][3978] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" host="localhost" May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.590 [INFO][3978] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:55.607229 env[1198]: 2025-05-13 00:45:55.590 [INFO][3978] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" HandleID="k8s-pod-network.a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.607872 env[1198]: 2025-05-13 00:45:55.592 [INFO][3962] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Namespace="calico-system" Pod="csi-node-driver-qt7kw" WorkloadEndpoint="localhost-k8s-csi--node--driver--qt7kw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qt7kw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cc4ea95c-a97c-4a6c-92c7-f7420431f01f", ResourceVersion:"912", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-qt7kw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid5d0a32bbec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:55.607872 env[1198]: 2025-05-13 00:45:55.592 [INFO][3962] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Namespace="calico-system" Pod="csi-node-driver-qt7kw" WorkloadEndpoint="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.607872 env[1198]: 2025-05-13 00:45:55.592 [INFO][3962] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid5d0a32bbec ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Namespace="calico-system" Pod="csi-node-driver-qt7kw" WorkloadEndpoint="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.607872 env[1198]: 2025-05-13 00:45:55.596 [INFO][3962] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Namespace="calico-system" Pod="csi-node-driver-qt7kw" WorkloadEndpoint="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.607872 env[1198]: 2025-05-13 00:45:55.596 [INFO][3962] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Namespace="calico-system" Pod="csi-node-driver-qt7kw" WorkloadEndpoint="localhost-k8s-csi--node--driver--qt7kw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qt7kw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cc4ea95c-a97c-4a6c-92c7-f7420431f01f", ResourceVersion:"912", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c", Pod:"csi-node-driver-qt7kw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid5d0a32bbec", MAC:"7a:a3:fd:ef:09:51", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:55.607872 env[1198]: 2025-05-13 00:45:55.605 [INFO][3962] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c" Namespace="calico-system" Pod="csi-node-driver-qt7kw" WorkloadEndpoint="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:45:55.615000 audit[4002]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=4002 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:45:55.615000 audit[4002]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffe9dce6620 a2=0 a3=7ffe9dce660c items=0 ppid=3540 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.615000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:45:55.619853 env[1198]: time="2025-05-13T00:45:55.619779288Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:55.619853 env[1198]: time="2025-05-13T00:45:55.619831516Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:55.619853 env[1198]: time="2025-05-13T00:45:55.619845172Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:55.620164 env[1198]: time="2025-05-13T00:45:55.620109208Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c pid=4010 runtime=io.containerd.runc.v2 May 13 00:45:55.631589 systemd[1]: Started cri-containerd-a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c.scope. May 13 00:45:55.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.641000 audit: BPF prog-id=170 op=LOAD May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4010 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613363666465333964653333333064363937366433316233623830 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4010 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613363666465333964653333333064363937366433316233623830 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit: BPF prog-id=171 op=LOAD May 13 00:45:55.642000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000096700 items=0 ppid=4010 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613363666465333964653333333064363937366433316233623830 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit: BPF prog-id=172 op=LOAD May 13 00:45:55.642000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000096748 items=0 ppid=4010 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613363666465333964653333333064363937366433316233623830 May 13 00:45:55.642000 audit: BPF prog-id=172 op=UNLOAD May 13 00:45:55.642000 audit: BPF prog-id=171 op=UNLOAD May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { perfmon } for pid=4020 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit[4020]: AVC avc: denied { bpf } for pid=4020 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:55.642000 audit: BPF prog-id=173 op=LOAD May 13 00:45:55.642000 audit[4020]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000096b58 items=0 ppid=4010 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:55.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613363666465333964653333333064363937366433316233623830 May 13 00:45:55.643514 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:45:55.652483 env[1198]: time="2025-05-13T00:45:55.652427530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qt7kw,Uid:cc4ea95c-a97c-4a6c-92c7-f7420431f01f,Namespace:calico-system,Attempt:1,} returns sandbox id \"a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c\"" May 13 00:45:55.902576 systemd-networkd[1023]: cali62ff2a22767: Gained IPv6LL May 13 00:45:56.033431 kubelet[1943]: E0513 00:45:56.032518 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:56.033431 kubelet[1943]: E0513 00:45:56.032849 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:56.071494 systemd[1]: run-containerd-runc-k8s.io-42ecb34cc2ed781b81aad967e96cb68feefd6b6f2b696f17a907fbba9a24242b-runc.bxsklX.mount: Deactivated successfully. May 13 00:45:56.188000 audit[4066]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=4066 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:56.188000 audit[4066]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcd3648e70 a2=0 a3=7ffcd3648e5c items=0 ppid=2086 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:56.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:56.195000 audit[4066]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=4066 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:56.195000 audit[4066]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcd3648e70 a2=0 a3=7ffcd3648e5c items=0 ppid=2086 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:56.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:56.223536 systemd-networkd[1023]: calieeb4dd87528: Gained IPv6LL May 13 00:45:56.257507 env[1198]: time="2025-05-13T00:45:56.257447837Z" level=info msg="StopPodSandbox for \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\"" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.310 [INFO][4083] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.310 [INFO][4083] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" iface="eth0" netns="/var/run/netns/cni-22298fa1-cd00-588a-6d49-080e0e409ee1" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.311 [INFO][4083] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" iface="eth0" netns="/var/run/netns/cni-22298fa1-cd00-588a-6d49-080e0e409ee1" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.311 [INFO][4083] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" iface="eth0" netns="/var/run/netns/cni-22298fa1-cd00-588a-6d49-080e0e409ee1" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.311 [INFO][4083] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.311 [INFO][4083] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.335 [INFO][4092] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.335 [INFO][4092] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.335 [INFO][4092] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.342 [WARNING][4092] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.342 [INFO][4092] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.344 [INFO][4092] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:56.349093 env[1198]: 2025-05-13 00:45:56.346 [INFO][4083] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:45:56.349564 env[1198]: time="2025-05-13T00:45:56.349228647Z" level=info msg="TearDown network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\" successfully" May 13 00:45:56.349564 env[1198]: time="2025-05-13T00:45:56.349265766Z" level=info msg="StopPodSandbox for \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\" returns successfully" May 13 00:45:56.349966 env[1198]: time="2025-05-13T00:45:56.349940095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58ccc857f4-zx5gj,Uid:ac679fab-6266-466a-afb9-62d9c95cebb7,Namespace:calico-apiserver,Attempt:1,}" May 13 00:45:56.352102 systemd[1]: run-netns-cni\x2d22298fa1\x2dcd00\x2d588a\x2d6d49\x2d080e0e409ee1.mount: Deactivated successfully. May 13 00:45:56.606604 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL May 13 00:45:56.614532 systemd-networkd[1023]: cali2310655ab33: Link UP May 13 00:45:56.617327 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:45:56.617460 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2310655ab33: link becomes ready May 13 00:45:56.617591 systemd-networkd[1023]: cali2310655ab33: Gained carrier May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.432 [INFO][4101] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0 calico-apiserver-58ccc857f4- calico-apiserver ac679fab-6266-466a-afb9-62d9c95cebb7 929 0 2025-05-13 00:45:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58ccc857f4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-58ccc857f4-zx5gj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2310655ab33 [] []}} ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-zx5gj" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.432 [INFO][4101] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-zx5gj" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.461 [INFO][4114] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" HandleID="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.474 [INFO][4114] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" HandleID="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000362ca0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-58ccc857f4-zx5gj", "timestamp":"2025-05-13 00:45:56.461222808 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.475 [INFO][4114] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.475 [INFO][4114] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.475 [INFO][4114] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.476 [INFO][4114] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.480 [INFO][4114] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.486 [INFO][4114] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.488 [INFO][4114] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.489 [INFO][4114] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.489 [INFO][4114] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.491 [INFO][4114] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.515 [INFO][4114] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.610 [INFO][4114] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.610 [INFO][4114] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" host="localhost" May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.610 [INFO][4114] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:45:56.649683 env[1198]: 2025-05-13 00:45:56.610 [INFO][4114] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" HandleID="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.650530 env[1198]: 2025-05-13 00:45:56.612 [INFO][4101] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-zx5gj" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0", GenerateName:"calico-apiserver-58ccc857f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"ac679fab-6266-466a-afb9-62d9c95cebb7", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58ccc857f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-58ccc857f4-zx5gj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2310655ab33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:56.650530 env[1198]: 2025-05-13 00:45:56.612 [INFO][4101] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-zx5gj" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.650530 env[1198]: 2025-05-13 00:45:56.612 [INFO][4101] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2310655ab33 ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-zx5gj" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.650530 env[1198]: 2025-05-13 00:45:56.617 [INFO][4101] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-zx5gj" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.650530 env[1198]: 2025-05-13 00:45:56.618 [INFO][4101] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-zx5gj" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0", GenerateName:"calico-apiserver-58ccc857f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"ac679fab-6266-466a-afb9-62d9c95cebb7", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58ccc857f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b", Pod:"calico-apiserver-58ccc857f4-zx5gj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2310655ab33", MAC:"d6:87:05:e4:dd:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:45:56.650530 env[1198]: 2025-05-13 00:45:56.648 [INFO][4101] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Namespace="calico-apiserver" Pod="calico-apiserver-58ccc857f4-zx5gj" WorkloadEndpoint="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:45:56.657000 audit[4138]: NETFILTER_CFG table=filter:106 family=2 entries=42 op=nft_register_chain pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:45:56.657000 audit[4138]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffe88035e10 a2=0 a3=7ffe88035dfc items=0 ppid=3540 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:56.657000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:45:57.036947 kubelet[1943]: E0513 00:45:57.036838 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:57.054516 systemd-networkd[1023]: calid5d0a32bbec: Gained IPv6LL May 13 00:45:57.201403 env[1198]: time="2025-05-13T00:45:57.201332999Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:45:57.201628 env[1198]: time="2025-05-13T00:45:57.201387681Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:45:57.201628 env[1198]: time="2025-05-13T00:45:57.201397089Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:45:57.201792 env[1198]: time="2025-05-13T00:45:57.201755352Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b pid=4146 runtime=io.containerd.runc.v2 May 13 00:45:57.219585 systemd[1]: Started cri-containerd-dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b.scope. May 13 00:45:57.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit: BPF prog-id=174 op=LOAD May 13 00:45:57.228000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4146 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:57.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643863663637356661366663393334323135643734316230343530 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4146 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:57.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643863663637356661366663393334323135643734316230343530 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.228000 audit: BPF prog-id=175 op=LOAD May 13 00:45:57.228000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001c1f20 items=0 ppid=4146 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:57.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643863663637356661366663393334323135643734316230343530 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit: BPF prog-id=176 op=LOAD May 13 00:45:57.229000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001c1f68 items=0 ppid=4146 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:57.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643863663637356661366663393334323135643734316230343530 May 13 00:45:57.229000 audit: BPF prog-id=176 op=UNLOAD May 13 00:45:57.229000 audit: BPF prog-id=175 op=UNLOAD May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:57.229000 audit: BPF prog-id=177 op=LOAD May 13 00:45:57.229000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000384378 items=0 ppid=4146 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:57.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463643863663637356661366663393334323135643734316230343530 May 13 00:45:57.230175 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:45:57.254252 env[1198]: time="2025-05-13T00:45:57.254211678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58ccc857f4-zx5gj,Uid:ac679fab-6266-466a-afb9-62d9c95cebb7,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b\"" May 13 00:45:58.039793 kubelet[1943]: E0513 00:45:58.039758 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:45:58.467964 env[1198]: time="2025-05-13T00:45:58.467918921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:58.469892 env[1198]: time="2025-05-13T00:45:58.469857606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:58.471792 env[1198]: time="2025-05-13T00:45:58.471765403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:58.473277 env[1198]: time="2025-05-13T00:45:58.473245765Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:58.473804 env[1198]: time="2025-05-13T00:45:58.473784528Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:45:58.474808 env[1198]: time="2025-05-13T00:45:58.474773657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:45:58.476186 env[1198]: time="2025-05-13T00:45:58.476151317Z" level=info msg="CreateContainer within sandbox \"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:45:58.489671 env[1198]: time="2025-05-13T00:45:58.489641167Z" level=info msg="CreateContainer within sandbox \"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\"" May 13 00:45:58.490064 env[1198]: time="2025-05-13T00:45:58.490031340Z" level=info msg="StartContainer for \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\"" May 13 00:45:58.504839 systemd[1]: Started cri-containerd-b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25.scope. May 13 00:45:58.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519431 kernel: kauditd_printk_skb: 887 callbacks suppressed May 13 00:45:58.519486 kernel: audit: type=1400 audit(1747097158.517:1259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.528830 kernel: audit: type=1400 audit(1747097158.517:1260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.528883 kernel: audit: type=1400 audit(1747097158.517:1261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.528906 kernel: audit: type=1400 audit(1747097158.517:1262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.528928 kernel: audit: type=1400 audit(1747097158.517:1263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.528944 kernel: audit: type=1400 audit(1747097158.517:1264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.528962 kernel: audit: type=1400 audit(1747097158.517:1265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.528978 kernel: audit: type=1400 audit(1747097158.517:1266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.528995 kernel: audit: type=1400 audit(1747097158.517:1267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.529013 kernel: audit: type=1400 audit(1747097158.517:1268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.517000 audit: BPF prog-id=178 op=LOAD May 13 00:45:58.518000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3774 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:58.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353835643238313062346164636462313934323133316637356633 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3774 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:58.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353835643238313062346164636462313934323133316637356633 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.518000 audit: BPF prog-id=179 op=LOAD May 13 00:45:58.518000 audit[4192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d0020 items=0 ppid=3774 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:58.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353835643238313062346164636462313934323133316637356633 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.519000 audit: BPF prog-id=180 op=LOAD May 13 00:45:58.519000 audit[4192]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d0068 items=0 ppid=3774 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:58.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353835643238313062346164636462313934323133316637356633 May 13 00:45:58.522000 audit: BPF prog-id=180 op=UNLOAD May 13 00:45:58.522000 audit: BPF prog-id=179 op=UNLOAD May 13 00:45:58.522000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { perfmon } for pid=4192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit[4192]: AVC avc: denied { bpf } for pid=4192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:58.522000 audit: BPF prog-id=181 op=LOAD May 13 00:45:58.522000 audit[4192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0478 items=0 ppid=3774 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:58.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236353835643238313062346164636462313934323133316637356633 May 13 00:45:58.526847 systemd-networkd[1023]: cali2310655ab33: Gained IPv6LL May 13 00:45:58.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.89:22-10.0.0.1:41492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:58.576889 systemd[1]: Started sshd@13-10.0.0.89:22-10.0.0.1:41492.service. May 13 00:45:58.589321 env[1198]: time="2025-05-13T00:45:58.589272222Z" level=info msg="StartContainer for \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\" returns successfully" May 13 00:45:58.623000 audit[4216]: USER_ACCT pid=4216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:58.624473 sshd[4216]: Accepted publickey for core from 10.0.0.1 port 41492 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:45:58.624000 audit[4216]: CRED_ACQ pid=4216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:58.624000 audit[4216]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0b190bb0 a2=3 a3=0 items=0 ppid=1 pid=4216 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:58.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:45:58.625542 sshd[4216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:45:58.629127 systemd-logind[1188]: New session 14 of user core. May 13 00:45:58.629868 systemd[1]: Started session-14.scope. May 13 00:45:58.634000 audit[4216]: USER_START pid=4216 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:58.635000 audit[4227]: CRED_ACQ pid=4227 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:58.745895 sshd[4216]: pam_unix(sshd:session): session closed for user core May 13 00:45:58.746000 audit[4216]: USER_END pid=4216 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:58.746000 audit[4216]: CRED_DISP pid=4216 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:45:58.748573 systemd[1]: sshd@13-10.0.0.89:22-10.0.0.1:41492.service: Deactivated successfully. May 13 00:45:58.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.89:22-10.0.0.1:41492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:45:58.749266 systemd[1]: session-14.scope: Deactivated successfully. May 13 00:45:58.749893 systemd-logind[1188]: Session 14 logged out. Waiting for processes to exit. May 13 00:45:58.750627 systemd-logind[1188]: Removed session 14. May 13 00:45:59.052413 kubelet[1943]: I0513 00:45:59.052206 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-58ccc857f4-5zdsn" podStartSLOduration=30.542257404 podStartE2EDuration="34.052187909s" podCreationTimestamp="2025-05-13 00:45:25 +0000 UTC" firstStartedPulling="2025-05-13 00:45:54.964668695 +0000 UTC m=+42.800068092" lastFinishedPulling="2025-05-13 00:45:58.4745992 +0000 UTC m=+46.309998597" observedRunningTime="2025-05-13 00:45:59.051863048 +0000 UTC m=+46.887262445" watchObservedRunningTime="2025-05-13 00:45:59.052187909 +0000 UTC m=+46.887587306" May 13 00:45:59.062000 audit[4240]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=4240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:59.062000 audit[4240]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe3b89ffe0 a2=0 a3=7ffe3b89ffcc items=0 ppid=2086 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:59.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:59.069000 audit[4240]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=4240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:59.069000 audit[4240]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3b89ffe0 a2=0 a3=7ffe3b89ffcc items=0 ppid=2086 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:59.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:59.250000 audit[4203]: AVC avc: denied { watch } for pid=4203 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_45_40.225752415/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c230,c543 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c230,c543 tclass=file permissive=0 May 13 00:45:59.250000 audit[4203]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00047b080 a2=fc6 a3=0 items=0 ppid=3774 pid=4203 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c230,c543 key=(null) May 13 00:45:59.250000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:45:59.282000 audit[4242]: NETFILTER_CFG table=filter:109 family=2 entries=9 op=nft_register_rule pid=4242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:59.282000 audit[4242]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe481580b0 a2=0 a3=7ffe4815809c items=0 ppid=2086 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:59.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:59.286000 audit[4242]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=4242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:45:59.286000 audit[4242]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe481580b0 a2=0 a3=7ffe4815809c items=0 ppid=2086 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:59.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:45:59.869911 env[1198]: time="2025-05-13T00:45:59.869863339Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:59.871681 env[1198]: time="2025-05-13T00:45:59.871614771Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:59.872996 env[1198]: time="2025-05-13T00:45:59.872962956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:59.874319 env[1198]: time="2025-05-13T00:45:59.874280633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:45:59.874893 env[1198]: time="2025-05-13T00:45:59.874837991Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 00:45:59.876006 env[1198]: time="2025-05-13T00:45:59.875970900Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:45:59.876668 env[1198]: time="2025-05-13T00:45:59.876643404Z" level=info msg="CreateContainer within sandbox \"a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:45:59.891543 env[1198]: time="2025-05-13T00:45:59.890607645Z" level=info msg="CreateContainer within sandbox \"a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d10ea1c1f0349d51dd16463f14c74d8c994492f9503f787f75805e186baf3ad8\"" May 13 00:45:59.891543 env[1198]: time="2025-05-13T00:45:59.891257827Z" level=info msg="StartContainer for \"d10ea1c1f0349d51dd16463f14c74d8c994492f9503f787f75805e186baf3ad8\"" May 13 00:45:59.910077 systemd[1]: Started cri-containerd-d10ea1c1f0349d51dd16463f14c74d8c994492f9503f787f75805e186baf3ad8.scope. May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f671c7659b8 items=0 ppid=4010 pid=4251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:59.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431306561316331663033343964353164643136343633663134633734 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit: BPF prog-id=182 op=LOAD May 13 00:45:59.922000 audit[4251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001b5588 items=0 ppid=4010 pid=4251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:59.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431306561316331663033343964353164643136343633663134633734 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit: BPF prog-id=183 op=LOAD May 13 00:45:59.922000 audit[4251]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001b55d8 items=0 ppid=4010 pid=4251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:59.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431306561316331663033343964353164643136343633663134633734 May 13 00:45:59.922000 audit: BPF prog-id=183 op=UNLOAD May 13 00:45:59.922000 audit: BPF prog-id=182 op=UNLOAD May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { perfmon } for pid=4251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit[4251]: AVC avc: denied { bpf } for pid=4251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:45:59.922000 audit: BPF prog-id=184 op=LOAD May 13 00:45:59.922000 audit[4251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001b5668 items=0 ppid=4010 pid=4251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:45:59.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431306561316331663033343964353164643136343633663134633734 May 13 00:45:59.933133 env[1198]: time="2025-05-13T00:45:59.933090977Z" level=info msg="StartContainer for \"d10ea1c1f0349d51dd16463f14c74d8c994492f9503f787f75805e186baf3ad8\" returns successfully" May 13 00:46:00.238897 env[1198]: time="2025-05-13T00:46:00.238768314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:00.240684 env[1198]: time="2025-05-13T00:46:00.240632288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:00.242316 env[1198]: time="2025-05-13T00:46:00.242287139Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:00.243721 env[1198]: time="2025-05-13T00:46:00.243693904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:00.244054 env[1198]: time="2025-05-13T00:46:00.244031078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:46:00.245058 env[1198]: time="2025-05-13T00:46:00.245038220Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:46:00.245822 env[1198]: time="2025-05-13T00:46:00.245794502Z" level=info msg="CreateContainer within sandbox \"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:46:00.258888 env[1198]: time="2025-05-13T00:46:00.258842750Z" level=info msg="CreateContainer within sandbox \"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\"" May 13 00:46:00.259253 env[1198]: time="2025-05-13T00:46:00.259228916Z" level=info msg="StartContainer for \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\"" May 13 00:46:00.272278 systemd[1]: Started cri-containerd-528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204.scope. May 13 00:46:00.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.283000 audit: BPF prog-id=185 op=LOAD May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4146 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:00.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386533646238613635356633333733323831373936633333666565 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4146 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:00.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386533646238613635356633333733323831373936633333666565 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit: BPF prog-id=186 op=LOAD May 13 00:46:00.284000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cdd10 items=0 ppid=4146 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:00.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386533646238613635356633333733323831373936633333666565 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit: BPF prog-id=187 op=LOAD May 13 00:46:00.284000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cdd58 items=0 ppid=4146 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:00.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386533646238613635356633333733323831373936633333666565 May 13 00:46:00.284000 audit: BPF prog-id=187 op=UNLOAD May 13 00:46:00.284000 audit: BPF prog-id=186 op=UNLOAD May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:00.284000 audit: BPF prog-id=188 op=LOAD May 13 00:46:00.284000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b8168 items=0 ppid=4146 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:00.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532386533646238613635356633333733323831373936633333666565 May 13 00:46:00.310670 env[1198]: time="2025-05-13T00:46:00.310626542Z" level=info msg="StartContainer for \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\" returns successfully" May 13 00:46:01.059992 kubelet[1943]: I0513 00:46:01.059920 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-58ccc857f4-zx5gj" podStartSLOduration=33.070344148 podStartE2EDuration="36.059900223s" podCreationTimestamp="2025-05-13 00:45:25 +0000 UTC" firstStartedPulling="2025-05-13 00:45:57.255307598 +0000 UTC m=+45.090706995" lastFinishedPulling="2025-05-13 00:46:00.244863673 +0000 UTC m=+48.080263070" observedRunningTime="2025-05-13 00:46:01.059629554 +0000 UTC m=+48.895028952" watchObservedRunningTime="2025-05-13 00:46:01.059900223 +0000 UTC m=+48.895299620" May 13 00:46:01.068000 audit[4325]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:01.068000 audit[4325]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcfa541230 a2=0 a3=7ffcfa54121c items=0 ppid=2086 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:01.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:01.073000 audit[4325]: NETFILTER_CFG table=nat:112 family=2 entries=30 op=nft_register_rule pid=4325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:01.073000 audit[4325]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcfa541230 a2=0 a3=7ffcfa54121c items=0 ppid=2086 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:01.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:01.142000 audit[4304]: AVC avc: denied { watch } for pid=4304 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_45_40.1384064302/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c53,c545 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c53,c545 tclass=file permissive=0 May 13 00:46:01.142000 audit[4304]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00161a360 a2=fc6 a3=0 items=0 ppid=4146 pid=4304 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c53,c545 key=(null) May 13 00:46:01.142000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:46:01.971232 env[1198]: time="2025-05-13T00:46:01.971182489Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:01.973332 env[1198]: time="2025-05-13T00:46:01.973303656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:01.974957 env[1198]: time="2025-05-13T00:46:01.974909835Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:01.976435 env[1198]: time="2025-05-13T00:46:01.976403011Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:01.976854 env[1198]: time="2025-05-13T00:46:01.976819845Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 00:46:01.978765 env[1198]: time="2025-05-13T00:46:01.978739303Z" level=info msg="CreateContainer within sandbox \"a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:46:01.991608 env[1198]: time="2025-05-13T00:46:01.991566495Z" level=info msg="CreateContainer within sandbox \"a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a62a3b8f2f41b6e76b96add03fa13b8c9e2a31c18ff51a2ddbb0e351189f4699\"" May 13 00:46:01.991971 env[1198]: time="2025-05-13T00:46:01.991938193Z" level=info msg="StartContainer for \"a62a3b8f2f41b6e76b96add03fa13b8c9e2a31c18ff51a2ddbb0e351189f4699\"" May 13 00:46:02.012423 systemd[1]: run-containerd-runc-k8s.io-a62a3b8f2f41b6e76b96add03fa13b8c9e2a31c18ff51a2ddbb0e351189f4699-runc.L7r5BN.mount: Deactivated successfully. May 13 00:46:02.013807 systemd[1]: Started cri-containerd-a62a3b8f2f41b6e76b96add03fa13b8c9e2a31c18ff51a2ddbb0e351189f4699.scope. May 13 00:46:02.026000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fba476cef38 items=0 ppid=4010 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:02.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136326133623866326634316236653736623936616464303366613133 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.026000 audit: BPF prog-id=189 op=LOAD May 13 00:46:02.026000 audit[4336]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00008f228 items=0 ppid=4010 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:02.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136326133623866326634316236653736623936616464303366613133 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit: BPF prog-id=190 op=LOAD May 13 00:46:02.027000 audit[4336]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00008f278 items=0 ppid=4010 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:02.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136326133623866326634316236653736623936616464303366613133 May 13 00:46:02.027000 audit: BPF prog-id=190 op=UNLOAD May 13 00:46:02.027000 audit: BPF prog-id=189 op=UNLOAD May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:02.027000 audit: BPF prog-id=191 op=LOAD May 13 00:46:02.027000 audit[4336]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00008f308 items=0 ppid=4010 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:02.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136326133623866326634316236653736623936616464303366613133 May 13 00:46:02.038954 env[1198]: time="2025-05-13T00:46:02.038920815Z" level=info msg="StartContainer for \"a62a3b8f2f41b6e76b96add03fa13b8c9e2a31c18ff51a2ddbb0e351189f4699\" returns successfully" May 13 00:46:02.054140 kubelet[1943]: I0513 00:46:02.054100 1943 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:46:02.063402 kubelet[1943]: I0513 00:46:02.063341 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-qt7kw" podStartSLOduration=30.739570521 podStartE2EDuration="37.063323875s" podCreationTimestamp="2025-05-13 00:45:25 +0000 UTC" firstStartedPulling="2025-05-13 00:45:55.653802495 +0000 UTC m=+43.489201892" lastFinishedPulling="2025-05-13 00:46:01.977555859 +0000 UTC m=+49.812955246" observedRunningTime="2025-05-13 00:46:02.063232834 +0000 UTC m=+49.898632251" watchObservedRunningTime="2025-05-13 00:46:02.063323875 +0000 UTC m=+49.898723262" May 13 00:46:02.347079 kubelet[1943]: I0513 00:46:02.347038 1943 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:46:02.347079 kubelet[1943]: I0513 00:46:02.347088 1943 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:46:03.750014 systemd[1]: Started sshd@14-10.0.0.89:22-10.0.0.1:41498.service. May 13 00:46:03.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:41498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:03.751351 kernel: kauditd_printk_skb: 225 callbacks suppressed May 13 00:46:03.751453 kernel: audit: type=1130 audit(1747097163.749:1324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:41498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:03.792000 audit[4370]: USER_ACCT pid=4370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.792706 sshd[4370]: Accepted publickey for core from 10.0.0.1 port 41498 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:03.795014 sshd[4370]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:03.794000 audit[4370]: CRED_ACQ pid=4370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.799082 systemd-logind[1188]: New session 15 of user core. May 13 00:46:03.800125 systemd[1]: Started session-15.scope. May 13 00:46:03.802276 kernel: audit: type=1101 audit(1747097163.792:1325): pid=4370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.802330 kernel: audit: type=1103 audit(1747097163.794:1326): pid=4370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.802351 kernel: audit: type=1006 audit(1747097163.794:1327): pid=4370 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 13 00:46:03.794000 audit[4370]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda478b770 a2=3 a3=0 items=0 ppid=1 pid=4370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:03.810271 kernel: audit: type=1300 audit(1747097163.794:1327): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda478b770 a2=3 a3=0 items=0 ppid=1 pid=4370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:03.810323 kernel: audit: type=1327 audit(1747097163.794:1327): proctitle=737368643A20636F7265205B707269765D May 13 00:46:03.794000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:03.804000 audit[4370]: USER_START pid=4370 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.816247 kernel: audit: type=1105 audit(1747097163.804:1328): pid=4370 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.816296 kernel: audit: type=1103 audit(1747097163.806:1329): pid=4372 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.806000 audit[4372]: CRED_ACQ pid=4372 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.917682 sshd[4370]: pam_unix(sshd:session): session closed for user core May 13 00:46:03.918000 audit[4370]: USER_END pid=4370 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.920328 systemd[1]: sshd@14-10.0.0.89:22-10.0.0.1:41498.service: Deactivated successfully. May 13 00:46:03.921227 systemd[1]: session-15.scope: Deactivated successfully. May 13 00:46:03.918000 audit[4370]: CRED_DISP pid=4370 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.925068 systemd-logind[1188]: Session 15 logged out. Waiting for processes to exit. May 13 00:46:03.926092 systemd-logind[1188]: Removed session 15. May 13 00:46:03.927231 kernel: audit: type=1106 audit(1747097163.918:1330): pid=4370 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.927338 kernel: audit: type=1104 audit(1747097163.918:1331): pid=4370 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:03.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:41498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:06.257300 env[1198]: time="2025-05-13T00:46:06.257247740Z" level=info msg="StopPodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\"" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.299 [INFO][4406] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.299 [INFO][4406] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" iface="eth0" netns="/var/run/netns/cni-b909851e-ff07-a6ce-c023-be53c8ec5efa" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.299 [INFO][4406] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" iface="eth0" netns="/var/run/netns/cni-b909851e-ff07-a6ce-c023-be53c8ec5efa" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.299 [INFO][4406] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" iface="eth0" netns="/var/run/netns/cni-b909851e-ff07-a6ce-c023-be53c8ec5efa" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.299 [INFO][4406] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.299 [INFO][4406] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.317 [INFO][4415] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.317 [INFO][4415] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.317 [INFO][4415] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.323 [WARNING][4415] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.323 [INFO][4415] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.324 [INFO][4415] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:06.328188 env[1198]: 2025-05-13 00:46:06.326 [INFO][4406] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:06.328764 env[1198]: time="2025-05-13T00:46:06.328421321Z" level=info msg="TearDown network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\" successfully" May 13 00:46:06.328764 env[1198]: time="2025-05-13T00:46:06.328471655Z" level=info msg="StopPodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\" returns successfully" May 13 00:46:06.328825 kubelet[1943]: E0513 00:46:06.328791 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:06.330139 env[1198]: time="2025-05-13T00:46:06.330088704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-wptff,Uid:873ef155-f7ef-4d06-a3e2-7be850c7a3ec,Namespace:kube-system,Attempt:1,}" May 13 00:46:06.333108 systemd[1]: run-netns-cni\x2db909851e\x2dff07\x2da6ce\x2dc023\x2dbe53c8ec5efa.mount: Deactivated successfully. May 13 00:46:06.437460 systemd-networkd[1023]: calicfcdc071dcd: Link UP May 13 00:46:06.440058 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:46:06.440151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicfcdc071dcd: link becomes ready May 13 00:46:06.440270 systemd-networkd[1023]: calicfcdc071dcd: Gained carrier May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.373 [INFO][4422] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--wptff-eth0 coredns-668d6bf9bc- kube-system 873ef155-f7ef-4d06-a3e2-7be850c7a3ec 1016 0 2025-05-13 00:45:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-wptff eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calicfcdc071dcd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Namespace="kube-system" Pod="coredns-668d6bf9bc-wptff" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--wptff-" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.373 [INFO][4422] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Namespace="kube-system" Pod="coredns-668d6bf9bc-wptff" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.399 [INFO][4437] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" HandleID="k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.407 [INFO][4437] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" HandleID="k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027f950), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-wptff", "timestamp":"2025-05-13 00:46:06.399916436 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.407 [INFO][4437] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.407 [INFO][4437] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.407 [INFO][4437] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.409 [INFO][4437] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.412 [INFO][4437] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.419 [INFO][4437] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.420 [INFO][4437] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.422 [INFO][4437] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.422 [INFO][4437] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.424 [INFO][4437] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53 May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.428 [INFO][4437] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.433 [INFO][4437] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.433 [INFO][4437] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" host="localhost" May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.433 [INFO][4437] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:06.452942 env[1198]: 2025-05-13 00:46:06.433 [INFO][4437] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" HandleID="k8s-pod-network.b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.454016 env[1198]: 2025-05-13 00:46:06.435 [INFO][4422] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Namespace="kube-system" Pod="coredns-668d6bf9bc-wptff" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--wptff-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"873ef155-f7ef-4d06-a3e2-7be850c7a3ec", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-wptff", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicfcdc071dcd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:06.454016 env[1198]: 2025-05-13 00:46:06.435 [INFO][4422] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Namespace="kube-system" Pod="coredns-668d6bf9bc-wptff" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.454016 env[1198]: 2025-05-13 00:46:06.435 [INFO][4422] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicfcdc071dcd ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Namespace="kube-system" Pod="coredns-668d6bf9bc-wptff" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.454016 env[1198]: 2025-05-13 00:46:06.440 [INFO][4422] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Namespace="kube-system" Pod="coredns-668d6bf9bc-wptff" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.454016 env[1198]: 2025-05-13 00:46:06.440 [INFO][4422] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Namespace="kube-system" Pod="coredns-668d6bf9bc-wptff" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--wptff-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"873ef155-f7ef-4d06-a3e2-7be850c7a3ec", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53", Pod:"coredns-668d6bf9bc-wptff", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicfcdc071dcd", MAC:"46:60:c2:e5:db:f9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:06.454016 env[1198]: 2025-05-13 00:46:06.450 [INFO][4422] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53" Namespace="kube-system" Pod="coredns-668d6bf9bc-wptff" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:06.460000 audit[4459]: NETFILTER_CFG table=filter:113 family=2 entries=42 op=nft_register_chain pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:46:06.460000 audit[4459]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7ffe55aa3a70 a2=0 a3=7ffe55aa3a5c items=0 ppid=3540 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.460000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:46:06.464327 env[1198]: time="2025-05-13T00:46:06.464239030Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:46:06.464327 env[1198]: time="2025-05-13T00:46:06.464285338Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:46:06.464327 env[1198]: time="2025-05-13T00:46:06.464295036Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:46:06.464697 env[1198]: time="2025-05-13T00:46:06.464630797Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53 pid=4468 runtime=io.containerd.runc.v2 May 13 00:46:06.477703 systemd[1]: Started cri-containerd-b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53.scope. May 13 00:46:06.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit: BPF prog-id=192 op=LOAD May 13 00:46:06.488000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.488000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4468 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230383565353030633066626236313235323435653265313639383166 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4468 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230383565353030633066626236313235323435653265313639383166 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit: BPF prog-id=193 op=LOAD May 13 00:46:06.489000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003703a0 items=0 ppid=4468 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230383565353030633066626236313235323435653265313639383166 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit: BPF prog-id=194 op=LOAD May 13 00:46:06.489000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003703e8 items=0 ppid=4468 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230383565353030633066626236313235323435653265313639383166 May 13 00:46:06.489000 audit: BPF prog-id=194 op=UNLOAD May 13 00:46:06.489000 audit: BPF prog-id=193 op=UNLOAD May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.489000 audit: BPF prog-id=195 op=LOAD May 13 00:46:06.489000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003707f8 items=0 ppid=4468 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230383565353030633066626236313235323435653265313639383166 May 13 00:46:06.490453 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:46:06.511013 env[1198]: time="2025-05-13T00:46:06.510918294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-wptff,Uid:873ef155-f7ef-4d06-a3e2-7be850c7a3ec,Namespace:kube-system,Attempt:1,} returns sandbox id \"b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53\"" May 13 00:46:06.512510 kubelet[1943]: E0513 00:46:06.511930 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:06.515052 env[1198]: time="2025-05-13T00:46:06.514947648Z" level=info msg="CreateContainer within sandbox \"b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:46:06.544055 env[1198]: time="2025-05-13T00:46:06.543995934Z" level=info msg="CreateContainer within sandbox \"b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"67624cae4797aa0703dfa961ee179542ffaa76f8e2670129f8018b988b9efbbe\"" May 13 00:46:06.544502 env[1198]: time="2025-05-13T00:46:06.544464404Z" level=info msg="StartContainer for \"67624cae4797aa0703dfa961ee179542ffaa76f8e2670129f8018b988b9efbbe\"" May 13 00:46:06.558035 systemd[1]: Started cri-containerd-67624cae4797aa0703dfa961ee179542ffaa76f8e2670129f8018b988b9efbbe.scope. May 13 00:46:06.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.569000 audit: BPF prog-id=196 op=LOAD May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4468 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363234636165343739376161303730336466613936316565313739 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4468 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363234636165343739376161303730336466613936316565313739 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit: BPF prog-id=197 op=LOAD May 13 00:46:06.570000 audit[4507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000288d00 items=0 ppid=4468 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363234636165343739376161303730336466613936316565313739 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit: BPF prog-id=198 op=LOAD May 13 00:46:06.570000 audit[4507]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000288d48 items=0 ppid=4468 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363234636165343739376161303730336466613936316565313739 May 13 00:46:06.570000 audit: BPF prog-id=198 op=UNLOAD May 13 00:46:06.570000 audit: BPF prog-id=197 op=UNLOAD May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:06.570000 audit: BPF prog-id=199 op=LOAD May 13 00:46:06.570000 audit[4507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000289158 items=0 ppid=4468 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:06.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363234636165343739376161303730336466613936316565313739 May 13 00:46:06.582176 env[1198]: time="2025-05-13T00:46:06.582136459Z" level=info msg="StartContainer for \"67624cae4797aa0703dfa961ee179542ffaa76f8e2670129f8018b988b9efbbe\" returns successfully" May 13 00:46:06.592000 audit[4517]: AVC avc: denied { getattr } for pid=4517 comm="coredns" path="cgroup:[4026532309]" dev="nsfs" ino=4026532309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c485,c919 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 13 00:46:06.592000 audit[4517]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0004fc7f8 a2=c000620b98 a3=0 items=0 ppid=4468 pid=4517 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c485,c919 key=(null) May 13 00:46:06.592000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 13 00:46:07.066639 kubelet[1943]: E0513 00:46:07.066592 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:07.076039 kubelet[1943]: I0513 00:46:07.075978 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-wptff" podStartSLOduration=49.075955941 podStartE2EDuration="49.075955941s" podCreationTimestamp="2025-05-13 00:45:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:46:07.075126963 +0000 UTC m=+54.910526360" watchObservedRunningTime="2025-05-13 00:46:07.075955941 +0000 UTC m=+54.911355338" May 13 00:46:07.086000 audit[4539]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:07.086000 audit[4539]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffec63e3b00 a2=0 a3=7ffec63e3aec items=0 ppid=2086 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:07.093000 audit[4539]: NETFILTER_CFG table=nat:115 family=2 entries=46 op=nft_register_rule pid=4539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:07.093000 audit[4539]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffec63e3b00 a2=0 a3=7ffec63e3aec items=0 ppid=2086 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:07.114000 audit[4541]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:07.114000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffddb698110 a2=0 a3=7ffddb6980fc items=0 ppid=2086 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:07.126000 audit[4541]: NETFILTER_CFG table=nat:117 family=2 entries=58 op=nft_register_chain pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:07.126000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffddb698110 a2=0 a3=7ffddb6980fc items=0 ppid=2086 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:07.257193 env[1198]: time="2025-05-13T00:46:07.257145551Z" level=info msg="StopPodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\"" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.298 [INFO][4559] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.298 [INFO][4559] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" iface="eth0" netns="/var/run/netns/cni-f9bf653c-5c57-7625-023f-82545921f16e" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.298 [INFO][4559] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" iface="eth0" netns="/var/run/netns/cni-f9bf653c-5c57-7625-023f-82545921f16e" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.298 [INFO][4559] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" iface="eth0" netns="/var/run/netns/cni-f9bf653c-5c57-7625-023f-82545921f16e" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.298 [INFO][4559] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.298 [INFO][4559] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.316 [INFO][4567] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.316 [INFO][4567] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.316 [INFO][4567] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.322 [WARNING][4567] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.322 [INFO][4567] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.323 [INFO][4567] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:07.326955 env[1198]: 2025-05-13 00:46:07.325 [INFO][4559] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:07.327655 env[1198]: time="2025-05-13T00:46:07.327075811Z" level=info msg="TearDown network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\" successfully" May 13 00:46:07.327655 env[1198]: time="2025-05-13T00:46:07.327110217Z" level=info msg="StopPodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\" returns successfully" May 13 00:46:07.327969 env[1198]: time="2025-05-13T00:46:07.327934155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b8658597f-c8g2s,Uid:53bc8e8a-8278-4145-89d0-64d17addf6bd,Namespace:calico-system,Attempt:1,}" May 13 00:46:07.332304 systemd[1]: run-containerd-runc-k8s.io-b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53-runc.VwM6SC.mount: Deactivated successfully. May 13 00:46:07.332447 systemd[1]: run-netns-cni\x2df9bf653c\x2d5c57\x2d7625\x2d023f\x2d82545921f16e.mount: Deactivated successfully. May 13 00:46:07.446916 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:46:07.447070 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali13cdfee3a33: link becomes ready May 13 00:46:07.444262 systemd-networkd[1023]: cali13cdfee3a33: Link UP May 13 00:46:07.446878 systemd-networkd[1023]: cali13cdfee3a33: Gained carrier May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.368 [INFO][4575] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0 calico-kube-controllers-6b8658597f- calico-system 53bc8e8a-8278-4145-89d0-64d17addf6bd 1037 0 2025-05-13 00:45:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6b8658597f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6b8658597f-c8g2s eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali13cdfee3a33 [] []}} ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Namespace="calico-system" Pod="calico-kube-controllers-6b8658597f-c8g2s" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.368 [INFO][4575] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Namespace="calico-system" Pod="calico-kube-controllers-6b8658597f-c8g2s" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.394 [INFO][4591] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" HandleID="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.404 [INFO][4591] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" HandleID="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005026e0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6b8658597f-c8g2s", "timestamp":"2025-05-13 00:46:07.394917107 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.404 [INFO][4591] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.404 [INFO][4591] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.404 [INFO][4591] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.407 [INFO][4591] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.411 [INFO][4591] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.416 [INFO][4591] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.418 [INFO][4591] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.421 [INFO][4591] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.421 [INFO][4591] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.423 [INFO][4591] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463 May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.432 [INFO][4591] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.439 [INFO][4591] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.439 [INFO][4591] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" host="localhost" May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.439 [INFO][4591] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:07.459430 env[1198]: 2025-05-13 00:46:07.439 [INFO][4591] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" HandleID="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.460480 env[1198]: 2025-05-13 00:46:07.442 [INFO][4575] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Namespace="calico-system" Pod="calico-kube-controllers-6b8658597f-c8g2s" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0", GenerateName:"calico-kube-controllers-6b8658597f-", Namespace:"calico-system", SelfLink:"", UID:"53bc8e8a-8278-4145-89d0-64d17addf6bd", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b8658597f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6b8658597f-c8g2s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali13cdfee3a33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:07.460480 env[1198]: 2025-05-13 00:46:07.442 [INFO][4575] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Namespace="calico-system" Pod="calico-kube-controllers-6b8658597f-c8g2s" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.460480 env[1198]: 2025-05-13 00:46:07.442 [INFO][4575] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali13cdfee3a33 ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Namespace="calico-system" Pod="calico-kube-controllers-6b8658597f-c8g2s" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.460480 env[1198]: 2025-05-13 00:46:07.446 [INFO][4575] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Namespace="calico-system" Pod="calico-kube-controllers-6b8658597f-c8g2s" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.460480 env[1198]: 2025-05-13 00:46:07.447 [INFO][4575] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Namespace="calico-system" Pod="calico-kube-controllers-6b8658597f-c8g2s" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0", GenerateName:"calico-kube-controllers-6b8658597f-", Namespace:"calico-system", SelfLink:"", UID:"53bc8e8a-8278-4145-89d0-64d17addf6bd", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b8658597f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463", Pod:"calico-kube-controllers-6b8658597f-c8g2s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali13cdfee3a33", MAC:"ee:cd:7a:f4:76:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:07.460480 env[1198]: 2025-05-13 00:46:07.456 [INFO][4575] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Namespace="calico-system" Pod="calico-kube-controllers-6b8658597f-c8g2s" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:07.469000 audit[4612]: NETFILTER_CFG table=filter:118 family=2 entries=50 op=nft_register_chain pid=4612 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:46:07.469000 audit[4612]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffd4cb11b60 a2=0 a3=7ffd4cb11b4c items=0 ppid=3540 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.469000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:46:07.486570 systemd-networkd[1023]: calicfcdc071dcd: Gained IPv6LL May 13 00:46:07.586673 env[1198]: time="2025-05-13T00:46:07.585359817Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:46:07.586673 env[1198]: time="2025-05-13T00:46:07.585420893Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:46:07.586673 env[1198]: time="2025-05-13T00:46:07.585438226Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:46:07.586673 env[1198]: time="2025-05-13T00:46:07.585662336Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463 pid=4621 runtime=io.containerd.runc.v2 May 13 00:46:07.603532 systemd[1]: Started cri-containerd-c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463.scope. May 13 00:46:07.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.613000 audit: BPF prog-id=200 op=LOAD May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653636323635386561643434333934353463633362623161663133 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653636323635386561643434333934353463633362623161663133 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit: BPF prog-id=201 op=LOAD May 13 00:46:07.614000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0002d3ce0 items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653636323635386561643434333934353463633362623161663133 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit: BPF prog-id=202 op=LOAD May 13 00:46:07.614000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0002d3d28 items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653636323635386561643434333934353463633362623161663133 May 13 00:46:07.614000 audit: BPF prog-id=202 op=UNLOAD May 13 00:46:07.614000 audit: BPF prog-id=201 op=UNLOAD May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:07.614000 audit: BPF prog-id=203 op=LOAD May 13 00:46:07.614000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003da138 items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:07.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336653636323635386561643434333934353463633362623161663133 May 13 00:46:07.615690 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:46:07.636100 env[1198]: time="2025-05-13T00:46:07.636040541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b8658597f-c8g2s,Uid:53bc8e8a-8278-4145-89d0-64d17addf6bd,Namespace:calico-system,Attempt:1,} returns sandbox id \"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463\"" May 13 00:46:07.638851 env[1198]: time="2025-05-13T00:46:07.638823110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 00:46:08.069766 kubelet[1943]: E0513 00:46:08.069734 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:08.258589 env[1198]: time="2025-05-13T00:46:08.258538054Z" level=info msg="StopPodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\"" May 13 00:46:08.330743 systemd[1]: run-containerd-runc-k8s.io-c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463-runc.MzLP0G.mount: Deactivated successfully. May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.309 [INFO][4669] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.309 [INFO][4669] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" iface="eth0" netns="/var/run/netns/cni-cc2c2dd7-4f73-b5a7-c454-ab7faecacdca" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.309 [INFO][4669] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" iface="eth0" netns="/var/run/netns/cni-cc2c2dd7-4f73-b5a7-c454-ab7faecacdca" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.309 [INFO][4669] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" iface="eth0" netns="/var/run/netns/cni-cc2c2dd7-4f73-b5a7-c454-ab7faecacdca" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.309 [INFO][4669] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.309 [INFO][4669] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.327 [INFO][4677] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.327 [INFO][4677] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.327 [INFO][4677] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.333 [WARNING][4677] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.333 [INFO][4677] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.334 [INFO][4677] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:08.337727 env[1198]: 2025-05-13 00:46:08.336 [INFO][4669] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:08.341003 env[1198]: time="2025-05-13T00:46:08.337946717Z" level=info msg="TearDown network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\" successfully" May 13 00:46:08.341003 env[1198]: time="2025-05-13T00:46:08.337981383Z" level=info msg="StopPodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\" returns successfully" May 13 00:46:08.341003 env[1198]: time="2025-05-13T00:46:08.338626816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d557d699b-thb6g,Uid:c2f71248-d833-4bac-99fb-c72ed63f199e,Namespace:calico-apiserver,Attempt:1,}" May 13 00:46:08.339831 systemd[1]: run-netns-cni\x2dcc2c2dd7\x2d4f73\x2db5a7\x2dc454\x2dab7faecacdca.mount: Deactivated successfully. May 13 00:46:08.578771 systemd-networkd[1023]: cali8fd2af61659: Link UP May 13 00:46:08.581063 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:46:08.581133 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8fd2af61659: link becomes ready May 13 00:46:08.581287 systemd-networkd[1023]: cali8fd2af61659: Gained carrier May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.385 [INFO][4686] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0 calico-apiserver-6d557d699b- calico-apiserver c2f71248-d833-4bac-99fb-c72ed63f199e 1052 0 2025-05-13 00:45:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d557d699b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6d557d699b-thb6g eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8fd2af61659 [] []}} ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Namespace="calico-apiserver" Pod="calico-apiserver-6d557d699b-thb6g" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d557d699b--thb6g-" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.385 [INFO][4686] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Namespace="calico-apiserver" Pod="calico-apiserver-6d557d699b-thb6g" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.415 [INFO][4701] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" HandleID="k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.423 [INFO][4701] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" HandleID="k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003090e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6d557d699b-thb6g", "timestamp":"2025-05-13 00:46:08.415355121 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.423 [INFO][4701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.423 [INFO][4701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.423 [INFO][4701] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.425 [INFO][4701] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.523 [INFO][4701] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.528 [INFO][4701] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.530 [INFO][4701] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.532 [INFO][4701] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.532 [INFO][4701] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.533 [INFO][4701] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5 May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.568 [INFO][4701] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.575 [INFO][4701] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.575 [INFO][4701] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" host="localhost" May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.575 [INFO][4701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:08.593011 env[1198]: 2025-05-13 00:46:08.575 [INFO][4701] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" HandleID="k8s-pod-network.01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.593880 env[1198]: 2025-05-13 00:46:08.577 [INFO][4686] cni-plugin/k8s.go 386: Populated endpoint ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Namespace="calico-apiserver" Pod="calico-apiserver-6d557d699b-thb6g" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0", GenerateName:"calico-apiserver-6d557d699b-", Namespace:"calico-apiserver", SelfLink:"", UID:"c2f71248-d833-4bac-99fb-c72ed63f199e", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d557d699b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6d557d699b-thb6g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8fd2af61659", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:08.593880 env[1198]: 2025-05-13 00:46:08.577 [INFO][4686] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.135/32] ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Namespace="calico-apiserver" Pod="calico-apiserver-6d557d699b-thb6g" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.593880 env[1198]: 2025-05-13 00:46:08.577 [INFO][4686] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8fd2af61659 ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Namespace="calico-apiserver" Pod="calico-apiserver-6d557d699b-thb6g" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.593880 env[1198]: 2025-05-13 00:46:08.581 [INFO][4686] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Namespace="calico-apiserver" Pod="calico-apiserver-6d557d699b-thb6g" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.593880 env[1198]: 2025-05-13 00:46:08.581 [INFO][4686] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Namespace="calico-apiserver" Pod="calico-apiserver-6d557d699b-thb6g" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0", GenerateName:"calico-apiserver-6d557d699b-", Namespace:"calico-apiserver", SelfLink:"", UID:"c2f71248-d833-4bac-99fb-c72ed63f199e", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d557d699b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5", Pod:"calico-apiserver-6d557d699b-thb6g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8fd2af61659", MAC:"6a:2d:19:bb:58:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:08.593880 env[1198]: 2025-05-13 00:46:08.591 [INFO][4686] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5" Namespace="calico-apiserver" Pod="calico-apiserver-6d557d699b-thb6g" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:08.602000 audit[4722]: NETFILTER_CFG table=filter:119 family=2 entries=54 op=nft_register_chain pid=4722 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:46:08.602000 audit[4722]: SYSCALL arch=c000003e syscall=46 success=yes exit=26268 a0=3 a1=7ffe8353cf50 a2=0 a3=7ffe8353cf3c items=0 ppid=3540 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.602000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:46:08.608151 env[1198]: time="2025-05-13T00:46:08.608057272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:46:08.608151 env[1198]: time="2025-05-13T00:46:08.608111925Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:46:08.608151 env[1198]: time="2025-05-13T00:46:08.608122725Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:46:08.608703 env[1198]: time="2025-05-13T00:46:08.608640609Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5 pid=4731 runtime=io.containerd.runc.v2 May 13 00:46:08.619279 systemd[1]: Started cri-containerd-01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5.scope. May 13 00:46:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit: BPF prog-id=204 op=LOAD May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653238336634316439656239373332313337343836373638656436 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653238336634316439656239373332313337343836373638656436 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit: BPF prog-id=205 op=LOAD May 13 00:46:08.630000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a89d0 items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653238336634316439656239373332313337343836373638656436 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit: BPF prog-id=206 op=LOAD May 13 00:46:08.630000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a8a18 items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653238336634316439656239373332313337343836373638656436 May 13 00:46:08.630000 audit: BPF prog-id=206 op=UNLOAD May 13 00:46:08.630000 audit: BPF prog-id=205 op=UNLOAD May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { perfmon } for pid=4740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit[4740]: AVC avc: denied { bpf } for pid=4740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.630000 audit: BPF prog-id=207 op=LOAD May 13 00:46:08.630000 audit[4740]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a8e28 items=0 ppid=4731 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031653238336634316439656239373332313337343836373638656436 May 13 00:46:08.632118 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:46:08.653785 env[1198]: time="2025-05-13T00:46:08.653726916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d557d699b-thb6g,Uid:c2f71248-d833-4bac-99fb-c72ed63f199e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5\"" May 13 00:46:08.657836 env[1198]: time="2025-05-13T00:46:08.657797906Z" level=info msg="CreateContainer within sandbox \"01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:46:08.672234 env[1198]: time="2025-05-13T00:46:08.672174837Z" level=info msg="CreateContainer within sandbox \"01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"19441ab246d17bb4435ed83e7a227f3202133dd860a0f80bd1c6c3a40dbbb3f7\"" May 13 00:46:08.672792 env[1198]: time="2025-05-13T00:46:08.672747293Z" level=info msg="StartContainer for \"19441ab246d17bb4435ed83e7a227f3202133dd860a0f80bd1c6c3a40dbbb3f7\"" May 13 00:46:08.687307 systemd[1]: Started cri-containerd-19441ab246d17bb4435ed83e7a227f3202133dd860a0f80bd1c6c3a40dbbb3f7.scope. May 13 00:46:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.701000 audit: BPF prog-id=208 op=LOAD May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4731 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343431616232343664313762623434333565643833653761323237 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4731 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343431616232343664313762623434333565643833653761323237 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit: BPF prog-id=209 op=LOAD May 13 00:46:08.702000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002e1d10 items=0 ppid=4731 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343431616232343664313762623434333565643833653761323237 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit: BPF prog-id=210 op=LOAD May 13 00:46:08.702000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002e1d58 items=0 ppid=4731 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343431616232343664313762623434333565643833653761323237 May 13 00:46:08.702000 audit: BPF prog-id=210 op=UNLOAD May 13 00:46:08.702000 audit: BPF prog-id=209 op=UNLOAD May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:08.702000 audit: BPF prog-id=211 op=LOAD May 13 00:46:08.702000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca168 items=0 ppid=4731 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139343431616232343664313762623434333565643833653761323237 May 13 00:46:08.738917 env[1198]: time="2025-05-13T00:46:08.738871749Z" level=info msg="StartContainer for \"19441ab246d17bb4435ed83e7a227f3202133dd860a0f80bd1c6c3a40dbbb3f7\" returns successfully" May 13 00:46:08.894578 systemd-networkd[1023]: cali13cdfee3a33: Gained IPv6LL May 13 00:46:08.922573 systemd[1]: Started sshd@15-10.0.0.89:22-10.0.0.1:36118.service. May 13 00:46:08.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:36118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:08.924454 kernel: kauditd_printk_skb: 310 callbacks suppressed May 13 00:46:08.924519 kernel: audit: type=1130 audit(1747097168.922:1431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:36118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:08.979000 audit[4806]: USER_ACCT pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:08.983661 sshd[4806]: Accepted publickey for core from 10.0.0.1 port 36118 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:08.988413 kernel: audit: type=1101 audit(1747097168.979:1432): pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:08.989241 sshd[4806]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:08.988000 audit[4806]: CRED_ACQ pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:08.997249 kernel: audit: type=1103 audit(1747097168.988:1433): pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:08.997354 kernel: audit: type=1006 audit(1747097168.988:1434): pid=4806 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 00:46:08.988000 audit[4806]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd2f73f00 a2=3 a3=0 items=0 ppid=1 pid=4806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:09.002435 kernel: audit: type=1300 audit(1747097168.988:1434): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd2f73f00 a2=3 a3=0 items=0 ppid=1 pid=4806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:08.988000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:09.005346 kernel: audit: type=1327 audit(1747097168.988:1434): proctitle=737368643A20636F7265205B707269765D May 13 00:46:09.004564 systemd[1]: Started session-16.scope. May 13 00:46:09.005021 systemd-logind[1188]: New session 16 of user core. May 13 00:46:09.011000 audit[4806]: USER_START pid=4806 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:09.014000 audit[4808]: CRED_ACQ pid=4808 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:09.021876 kernel: audit: type=1105 audit(1747097169.011:1435): pid=4806 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:09.022029 kernel: audit: type=1103 audit(1747097169.014:1436): pid=4808 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:09.073887 kubelet[1943]: E0513 00:46:09.073839 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:09.168000 audit[4813]: NETFILTER_CFG table=filter:120 family=2 entries=8 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:09.177195 kernel: audit: type=1325 audit(1747097169.168:1437): table=filter:120 family=2 entries=8 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:09.177357 kernel: audit: type=1300 audit(1747097169.168:1437): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff992f0160 a2=0 a3=7fff992f014c items=0 ppid=2086 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:09.168000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff992f0160 a2=0 a3=7fff992f014c items=0 ppid=2086 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:09.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:09.180000 audit[4813]: NETFILTER_CFG table=nat:121 family=2 entries=30 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:09.180000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff992f0160 a2=0 a3=7fff992f014c items=0 ppid=2086 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:09.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:09.280821 sshd[4806]: pam_unix(sshd:session): session closed for user core May 13 00:46:09.281000 audit[4806]: USER_END pid=4806 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:09.281000 audit[4806]: CRED_DISP pid=4806 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:09.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:36118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:09.283887 systemd[1]: sshd@15-10.0.0.89:22-10.0.0.1:36118.service: Deactivated successfully. May 13 00:46:09.284628 systemd[1]: session-16.scope: Deactivated successfully. May 13 00:46:09.285862 systemd-logind[1188]: Session 16 logged out. Waiting for processes to exit. May 13 00:46:09.286734 systemd-logind[1188]: Removed session 16. May 13 00:46:09.408000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:09.408000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002da66e0 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:46:09.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:46:09.409000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:09.409000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003320de0 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:46:09.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:46:09.477000 audit[4783]: AVC avc: denied { watch } for pid=4783 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_45_40.147544102/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c82,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c82,c657 tclass=file permissive=0 May 13 00:46:09.477000 audit[4783]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0013e1320 a2=fc6 a3=0 items=0 ppid=4731 pid=4783 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c82,c657 key=(null) May 13 00:46:09.477000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:46:09.705000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:09.705000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c007e11830 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:46:09.705000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:46:09.710000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:09.710000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:09.710000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00f6d2980 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:46:09.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:46:09.710000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:09.710000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c007e34540 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:46:09.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:46:09.710000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c007a46630 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:46:09.710000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:46:09.714000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:09.714000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00f6d2b40 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:46:09.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:46:09.714000 audit[1781]: AVC avc: denied { watch } for pid=1781 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:09.714000 audit[1781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c007e11ad0 a2=fc6 a3=0 items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c286 key=(null) May 13 00:46:09.714000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 13 00:46:09.854550 systemd-networkd[1023]: cali8fd2af61659: Gained IPv6LL May 13 00:46:10.061679 env[1198]: time="2025-05-13T00:46:10.061617575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:10.064780 env[1198]: time="2025-05-13T00:46:10.064722149Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:10.066743 env[1198]: time="2025-05-13T00:46:10.066684417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:10.068517 env[1198]: time="2025-05-13T00:46:10.068494328Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:46:10.068980 env[1198]: time="2025-05-13T00:46:10.068926000Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 13 00:46:10.075773 kubelet[1943]: I0513 00:46:10.075751 1943 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:46:10.077153 env[1198]: time="2025-05-13T00:46:10.077124188Z" level=info msg="CreateContainer within sandbox \"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:46:10.090595 env[1198]: time="2025-05-13T00:46:10.090543597Z" level=info msg="CreateContainer within sandbox \"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d\"" May 13 00:46:10.091344 env[1198]: time="2025-05-13T00:46:10.091082130Z" level=info msg="StartContainer for \"a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d\"" May 13 00:46:10.105641 systemd[1]: Started cri-containerd-a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d.scope. May 13 00:46:10.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.115000 audit: BPF prog-id=212 op=LOAD May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4621 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:10.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132373035323536373338356539633536636664636362393263323732 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4621 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:10.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132373035323536373338356539633536636664636362393263323732 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit: BPF prog-id=213 op=LOAD May 13 00:46:10.116000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003aa350 items=0 ppid=4621 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:10.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132373035323536373338356539633536636664636362393263323732 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit: BPF prog-id=214 op=LOAD May 13 00:46:10.116000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003aa398 items=0 ppid=4621 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:10.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132373035323536373338356539633536636664636362393263323732 May 13 00:46:10.116000 audit: BPF prog-id=214 op=UNLOAD May 13 00:46:10.116000 audit: BPF prog-id=213 op=UNLOAD May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:10.116000 audit: BPF prog-id=215 op=LOAD May 13 00:46:10.116000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003aa7a8 items=0 ppid=4621 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:10.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132373035323536373338356539633536636664636362393263323732 May 13 00:46:10.139627 env[1198]: time="2025-05-13T00:46:10.139588180Z" level=info msg="StartContainer for \"a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d\" returns successfully" May 13 00:46:11.124582 kubelet[1943]: I0513 00:46:11.124522 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d557d699b-thb6g" podStartSLOduration=45.124501374 podStartE2EDuration="45.124501374s" podCreationTimestamp="2025-05-13 00:45:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:46:09.155847702 +0000 UTC m=+56.991247099" watchObservedRunningTime="2025-05-13 00:46:11.124501374 +0000 UTC m=+58.959900771" May 13 00:46:11.175598 kubelet[1943]: I0513 00:46:11.175541 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6b8658597f-c8g2s" podStartSLOduration=43.742451141 podStartE2EDuration="46.17552258s" podCreationTimestamp="2025-05-13 00:45:25 +0000 UTC" firstStartedPulling="2025-05-13 00:46:07.637140678 +0000 UTC m=+55.472540075" lastFinishedPulling="2025-05-13 00:46:10.070212107 +0000 UTC m=+57.905611514" observedRunningTime="2025-05-13 00:46:11.125301248 +0000 UTC m=+58.960700655" watchObservedRunningTime="2025-05-13 00:46:11.17552258 +0000 UTC m=+59.010921977" May 13 00:46:12.232764 env[1198]: time="2025-05-13T00:46:12.232718338Z" level=info msg="StopPodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\"" May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.267 [WARNING][4893] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0", GenerateName:"calico-apiserver-6d557d699b-", Namespace:"calico-apiserver", SelfLink:"", UID:"c2f71248-d833-4bac-99fb-c72ed63f199e", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d557d699b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5", Pod:"calico-apiserver-6d557d699b-thb6g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8fd2af61659", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.267 [INFO][4893] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.267 [INFO][4893] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" iface="eth0" netns="" May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.267 [INFO][4893] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.267 [INFO][4893] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.288 [INFO][4903] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.289 [INFO][4903] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.289 [INFO][4903] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.295 [WARNING][4903] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.295 [INFO][4903] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.296 [INFO][4903] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.299348 env[1198]: 2025-05-13 00:46:12.297 [INFO][4893] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:12.299858 env[1198]: time="2025-05-13T00:46:12.299387271Z" level=info msg="TearDown network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\" successfully" May 13 00:46:12.299858 env[1198]: time="2025-05-13T00:46:12.299427406Z" level=info msg="StopPodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\" returns successfully" May 13 00:46:12.300011 env[1198]: time="2025-05-13T00:46:12.299978262Z" level=info msg="RemovePodSandbox for \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\"" May 13 00:46:12.300056 env[1198]: time="2025-05-13T00:46:12.300014009Z" level=info msg="Forcibly stopping sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\"" May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.331 [WARNING][4926] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0", GenerateName:"calico-apiserver-6d557d699b-", Namespace:"calico-apiserver", SelfLink:"", UID:"c2f71248-d833-4bac-99fb-c72ed63f199e", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d557d699b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"01e283f41d9eb9732137486768ed6ce278ef154a34cc51c6c8f672c6d4170bc5", Pod:"calico-apiserver-6d557d699b-thb6g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8fd2af61659", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.331 [INFO][4926] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.331 [INFO][4926] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" iface="eth0" netns="" May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.331 [INFO][4926] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.331 [INFO][4926] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.351 [INFO][4935] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.351 [INFO][4935] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.351 [INFO][4935] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.357 [WARNING][4935] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.357 [INFO][4935] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" HandleID="k8s-pod-network.2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" Workload="localhost-k8s-calico--apiserver--6d557d699b--thb6g-eth0" May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.359 [INFO][4935] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.361827 env[1198]: 2025-05-13 00:46:12.360 [INFO][4926] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425" May 13 00:46:12.362279 env[1198]: time="2025-05-13T00:46:12.361861890Z" level=info msg="TearDown network for sandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\" successfully" May 13 00:46:12.368681 env[1198]: time="2025-05-13T00:46:12.368635700Z" level=info msg="RemovePodSandbox \"2f8305e33cad391bea88bc2134616f2944a72b3ec62395c37ec4fb5ad9f48425\" returns successfully" May 13 00:46:12.369499 env[1198]: time="2025-05-13T00:46:12.369473735Z" level=info msg="StopPodSandbox for \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\"" May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.415 [WARNING][4957] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0", GenerateName:"calico-apiserver-58ccc857f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"087c8e13-074f-4fde-b3bf-565afc56de3e", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58ccc857f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71", Pod:"calico-apiserver-58ccc857f4-5zdsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali62ff2a22767", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.415 [INFO][4957] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.415 [INFO][4957] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" iface="eth0" netns="" May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.415 [INFO][4957] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.416 [INFO][4957] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.435 [INFO][4965] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.435 [INFO][4965] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.435 [INFO][4965] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.441 [WARNING][4965] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.441 [INFO][4965] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.443 [INFO][4965] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.445771 env[1198]: 2025-05-13 00:46:12.444 [INFO][4957] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:46:12.446353 env[1198]: time="2025-05-13T00:46:12.445801590Z" level=info msg="TearDown network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\" successfully" May 13 00:46:12.446353 env[1198]: time="2025-05-13T00:46:12.445834982Z" level=info msg="StopPodSandbox for \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\" returns successfully" May 13 00:46:12.446425 env[1198]: time="2025-05-13T00:46:12.446359007Z" level=info msg="RemovePodSandbox for \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\"" May 13 00:46:12.446425 env[1198]: time="2025-05-13T00:46:12.446397048Z" level=info msg="Forcibly stopping sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\"" May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.480 [WARNING][4988] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0", GenerateName:"calico-apiserver-58ccc857f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"087c8e13-074f-4fde-b3bf-565afc56de3e", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58ccc857f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71", Pod:"calico-apiserver-58ccc857f4-5zdsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali62ff2a22767", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.481 [INFO][4988] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.481 [INFO][4988] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" iface="eth0" netns="" May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.481 [INFO][4988] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.481 [INFO][4988] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.504 [INFO][4996] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.504 [INFO][4996] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.504 [INFO][4996] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.510 [WARNING][4996] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.510 [INFO][4996] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" HandleID="k8s-pod-network.b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.512 [INFO][4996] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.515397 env[1198]: 2025-05-13 00:46:12.513 [INFO][4988] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407" May 13 00:46:12.515397 env[1198]: time="2025-05-13T00:46:12.515342559Z" level=info msg="TearDown network for sandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\" successfully" May 13 00:46:12.520008 env[1198]: time="2025-05-13T00:46:12.519940941Z" level=info msg="RemovePodSandbox \"b393f28e459431f3ea2ed215533bfffcd0adc8196981fc65df97ae6588ad8407\" returns successfully" May 13 00:46:12.520562 env[1198]: time="2025-05-13T00:46:12.520532673Z" level=info msg="StopPodSandbox for \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\"" May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.554 [WARNING][5018] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qgl96-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e28234ba-dcea-49e7-8e00-9577ae7d87d2", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487", Pod:"coredns-668d6bf9bc-qgl96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieeb4dd87528", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.555 [INFO][5018] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.555 [INFO][5018] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" iface="eth0" netns="" May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.555 [INFO][5018] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.555 [INFO][5018] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.573 [INFO][5026] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.574 [INFO][5026] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.574 [INFO][5026] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.580 [WARNING][5026] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.580 [INFO][5026] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.582 [INFO][5026] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.585508 env[1198]: 2025-05-13 00:46:12.584 [INFO][5018] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:46:12.585508 env[1198]: time="2025-05-13T00:46:12.585471844Z" level=info msg="TearDown network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\" successfully" May 13 00:46:12.585508 env[1198]: time="2025-05-13T00:46:12.585503834Z" level=info msg="StopPodSandbox for \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\" returns successfully" May 13 00:46:12.586250 env[1198]: time="2025-05-13T00:46:12.586037227Z" level=info msg="RemovePodSandbox for \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\"" May 13 00:46:12.586250 env[1198]: time="2025-05-13T00:46:12.586064017Z" level=info msg="Forcibly stopping sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\"" May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.620 [WARNING][5048] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qgl96-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e28234ba-dcea-49e7-8e00-9577ae7d87d2", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aca73492ff88788c357a5ec8a9b3615e3d7e70e02c663650114ac4134ace9487", Pod:"coredns-668d6bf9bc-qgl96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieeb4dd87528", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.621 [INFO][5048] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.621 [INFO][5048] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" iface="eth0" netns="" May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.621 [INFO][5048] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.621 [INFO][5048] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.646 [INFO][5056] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.646 [INFO][5056] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.646 [INFO][5056] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.652 [WARNING][5056] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.653 [INFO][5056] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" HandleID="k8s-pod-network.bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" Workload="localhost-k8s-coredns--668d6bf9bc--qgl96-eth0" May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.654 [INFO][5056] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.658146 env[1198]: 2025-05-13 00:46:12.656 [INFO][5048] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5" May 13 00:46:12.658786 env[1198]: time="2025-05-13T00:46:12.658189794Z" level=info msg="TearDown network for sandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\" successfully" May 13 00:46:12.662349 env[1198]: time="2025-05-13T00:46:12.662271615Z" level=info msg="RemovePodSandbox \"bbd9634863eaa677c910190453f4e9d5ddce7c41f798aa5cbb3792d84d4ca0a5\" returns successfully" May 13 00:46:12.662812 env[1198]: time="2025-05-13T00:46:12.662787856Z" level=info msg="StopPodSandbox for \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\"" May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.699 [WARNING][5078] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0", GenerateName:"calico-apiserver-58ccc857f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"ac679fab-6266-466a-afb9-62d9c95cebb7", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58ccc857f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b", Pod:"calico-apiserver-58ccc857f4-zx5gj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2310655ab33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.700 [INFO][5078] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.700 [INFO][5078] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" iface="eth0" netns="" May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.700 [INFO][5078] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.700 [INFO][5078] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.721 [INFO][5086] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.721 [INFO][5086] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.721 [INFO][5086] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.729 [WARNING][5086] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.730 [INFO][5086] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.731 [INFO][5086] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.735171 env[1198]: 2025-05-13 00:46:12.733 [INFO][5078] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:46:12.735793 env[1198]: time="2025-05-13T00:46:12.735201884Z" level=info msg="TearDown network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\" successfully" May 13 00:46:12.735793 env[1198]: time="2025-05-13T00:46:12.735247971Z" level=info msg="StopPodSandbox for \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\" returns successfully" May 13 00:46:12.735913 env[1198]: time="2025-05-13T00:46:12.735875831Z" level=info msg="RemovePodSandbox for \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\"" May 13 00:46:12.735947 env[1198]: time="2025-05-13T00:46:12.735914153Z" level=info msg="Forcibly stopping sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\"" May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.770 [WARNING][5109] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0", GenerateName:"calico-apiserver-58ccc857f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"ac679fab-6266-466a-afb9-62d9c95cebb7", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58ccc857f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b", Pod:"calico-apiserver-58ccc857f4-zx5gj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2310655ab33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.770 [INFO][5109] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.770 [INFO][5109] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" iface="eth0" netns="" May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.770 [INFO][5109] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.770 [INFO][5109] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.790 [INFO][5118] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.790 [INFO][5118] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.790 [INFO][5118] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.796 [WARNING][5118] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.796 [INFO][5118] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" HandleID="k8s-pod-network.474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.798 [INFO][5118] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.801915 env[1198]: 2025-05-13 00:46:12.800 [INFO][5109] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3" May 13 00:46:12.801915 env[1198]: time="2025-05-13T00:46:12.801880023Z" level=info msg="TearDown network for sandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\" successfully" May 13 00:46:12.806544 env[1198]: time="2025-05-13T00:46:12.806472193Z" level=info msg="RemovePodSandbox \"474d981079f887d7ac765f6e69ad277b0b4128cee53c39f81ced8e13ac2194a3\" returns successfully" May 13 00:46:12.807123 env[1198]: time="2025-05-13T00:46:12.807078022Z" level=info msg="StopPodSandbox for \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\"" May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.842 [WARNING][5141] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qt7kw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cc4ea95c-a97c-4a6c-92c7-f7420431f01f", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c", Pod:"csi-node-driver-qt7kw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid5d0a32bbec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.842 [INFO][5141] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.842 [INFO][5141] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" iface="eth0" netns="" May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.842 [INFO][5141] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.842 [INFO][5141] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.863 [INFO][5149] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.863 [INFO][5149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.863 [INFO][5149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.870 [WARNING][5149] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.870 [INFO][5149] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.871 [INFO][5149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.874733 env[1198]: 2025-05-13 00:46:12.873 [INFO][5141] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:46:12.875297 env[1198]: time="2025-05-13T00:46:12.874776088Z" level=info msg="TearDown network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\" successfully" May 13 00:46:12.875297 env[1198]: time="2025-05-13T00:46:12.874816153Z" level=info msg="StopPodSandbox for \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\" returns successfully" May 13 00:46:12.875382 env[1198]: time="2025-05-13T00:46:12.875337884Z" level=info msg="RemovePodSandbox for \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\"" May 13 00:46:12.875422 env[1198]: time="2025-05-13T00:46:12.875384492Z" level=info msg="Forcibly stopping sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\"" May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.909 [WARNING][5172] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qt7kw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cc4ea95c-a97c-4a6c-92c7-f7420431f01f", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a3a3cfde39de3330d6976d31b3b80b57a1855008c945920c14ae8c5bbd6b2d7c", Pod:"csi-node-driver-qt7kw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid5d0a32bbec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.909 [INFO][5172] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.909 [INFO][5172] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" iface="eth0" netns="" May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.909 [INFO][5172] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.909 [INFO][5172] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.929 [INFO][5181] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.929 [INFO][5181] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.929 [INFO][5181] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.935 [WARNING][5181] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.935 [INFO][5181] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" HandleID="k8s-pod-network.6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" Workload="localhost-k8s-csi--node--driver--qt7kw-eth0" May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.937 [INFO][5181] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:12.940536 env[1198]: 2025-05-13 00:46:12.938 [INFO][5172] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2" May 13 00:46:12.941108 env[1198]: time="2025-05-13T00:46:12.940557373Z" level=info msg="TearDown network for sandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\" successfully" May 13 00:46:12.944926 env[1198]: time="2025-05-13T00:46:12.944843367Z" level=info msg="RemovePodSandbox \"6d9dab3152f1bc3e9c0a3d9824c4fc70289e57a68cd95f48a8a5fa49f3191ca2\" returns successfully" May 13 00:46:12.945400 env[1198]: time="2025-05-13T00:46:12.945351051Z" level=info msg="StopPodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\"" May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:12.978 [WARNING][5204] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0", GenerateName:"calico-kube-controllers-6b8658597f-", Namespace:"calico-system", SelfLink:"", UID:"53bc8e8a-8278-4145-89d0-64d17addf6bd", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b8658597f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463", Pod:"calico-kube-controllers-6b8658597f-c8g2s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali13cdfee3a33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:12.978 [INFO][5204] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:12.978 [INFO][5204] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" iface="eth0" netns="" May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:12.978 [INFO][5204] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:12.978 [INFO][5204] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:13.001 [INFO][5212] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:13.002 [INFO][5212] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:13.002 [INFO][5212] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:13.008 [WARNING][5212] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:13.008 [INFO][5212] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:13.009 [INFO][5212] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:13.012837 env[1198]: 2025-05-13 00:46:13.011 [INFO][5204] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:13.013352 env[1198]: time="2025-05-13T00:46:13.012858920Z" level=info msg="TearDown network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\" successfully" May 13 00:46:13.013352 env[1198]: time="2025-05-13T00:46:13.012891010Z" level=info msg="StopPodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\" returns successfully" May 13 00:46:13.013562 env[1198]: time="2025-05-13T00:46:13.013442817Z" level=info msg="RemovePodSandbox for \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\"" May 13 00:46:13.013562 env[1198]: time="2025-05-13T00:46:13.013485617Z" level=info msg="Forcibly stopping sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\"" May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.049 [WARNING][5234] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0", GenerateName:"calico-kube-controllers-6b8658597f-", Namespace:"calico-system", SelfLink:"", UID:"53bc8e8a-8278-4145-89d0-64d17addf6bd", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b8658597f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463", Pod:"calico-kube-controllers-6b8658597f-c8g2s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali13cdfee3a33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.049 [INFO][5234] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.049 [INFO][5234] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" iface="eth0" netns="" May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.049 [INFO][5234] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.049 [INFO][5234] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.074 [INFO][5242] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.074 [INFO][5242] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.074 [INFO][5242] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.081 [WARNING][5242] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.081 [INFO][5242] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" HandleID="k8s-pod-network.1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.083 [INFO][5242] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:13.087957 env[1198]: 2025-05-13 00:46:13.085 [INFO][5234] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14" May 13 00:46:13.087957 env[1198]: time="2025-05-13T00:46:13.086869688Z" level=info msg="TearDown network for sandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\" successfully" May 13 00:46:13.094448 env[1198]: time="2025-05-13T00:46:13.094400300Z" level=info msg="RemovePodSandbox \"1ae27e0dd9e85669f428fcd2ef3ca58c5aff5b977d041b200d485fe91e6a1b14\" returns successfully" May 13 00:46:13.094864 env[1198]: time="2025-05-13T00:46:13.094812505Z" level=info msg="StopPodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\"" May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.127 [WARNING][5264] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--wptff-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"873ef155-f7ef-4d06-a3e2-7be850c7a3ec", ResourceVersion:"1030", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53", Pod:"coredns-668d6bf9bc-wptff", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicfcdc071dcd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.127 [INFO][5264] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.127 [INFO][5264] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" iface="eth0" netns="" May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.127 [INFO][5264] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.127 [INFO][5264] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.146 [INFO][5272] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.146 [INFO][5272] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.146 [INFO][5272] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.152 [WARNING][5272] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.152 [INFO][5272] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.154 [INFO][5272] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:13.157095 env[1198]: 2025-05-13 00:46:13.155 [INFO][5264] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:13.157794 env[1198]: time="2025-05-13T00:46:13.157111612Z" level=info msg="TearDown network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\" successfully" May 13 00:46:13.157794 env[1198]: time="2025-05-13T00:46:13.157147380Z" level=info msg="StopPodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\" returns successfully" May 13 00:46:13.157794 env[1198]: time="2025-05-13T00:46:13.157656066Z" level=info msg="RemovePodSandbox for \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\"" May 13 00:46:13.157794 env[1198]: time="2025-05-13T00:46:13.157685862Z" level=info msg="Forcibly stopping sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\"" May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.190 [WARNING][5295] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--wptff-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"873ef155-f7ef-4d06-a3e2-7be850c7a3ec", ResourceVersion:"1030", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b085e500c0fbb6125245e2e16981f6146df6c01e42c054f14219ded1419dfb53", Pod:"coredns-668d6bf9bc-wptff", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicfcdc071dcd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.190 [INFO][5295] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.190 [INFO][5295] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" iface="eth0" netns="" May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.190 [INFO][5295] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.190 [INFO][5295] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.208 [INFO][5304] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.208 [INFO][5304] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.208 [INFO][5304] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.218 [WARNING][5304] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.218 [INFO][5304] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" HandleID="k8s-pod-network.3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" Workload="localhost-k8s-coredns--668d6bf9bc--wptff-eth0" May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.219 [INFO][5304] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:13.222264 env[1198]: 2025-05-13 00:46:13.221 [INFO][5295] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0" May 13 00:46:13.222801 env[1198]: time="2025-05-13T00:46:13.222266076Z" level=info msg="TearDown network for sandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\" successfully" May 13 00:46:13.225874 env[1198]: time="2025-05-13T00:46:13.225824635Z" level=info msg="RemovePodSandbox \"3ca5d549675dd915b5c73b2f9c2728b5dcd240c8792ca4abb5166288440b90b0\" returns successfully" May 13 00:46:14.285722 systemd[1]: Started sshd@16-10.0.0.89:22-10.0.0.1:36128.service. May 13 00:46:14.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.89:22-10.0.0.1:36128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:14.286989 kernel: kauditd_printk_skb: 91 callbacks suppressed May 13 00:46:14.287055 kernel: audit: type=1130 audit(1747097174.285:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.89:22-10.0.0.1:36128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:14.331000 audit[5314]: USER_ACCT pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.331774 sshd[5314]: Accepted publickey for core from 10.0.0.1 port 36128 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:14.334154 sshd[5314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:14.333000 audit[5314]: CRED_ACQ pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.351302 systemd-logind[1188]: New session 17 of user core. May 13 00:46:14.353723 kernel: audit: type=1101 audit(1747097174.331:1470): pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.353754 kernel: audit: type=1103 audit(1747097174.333:1471): pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.353769 kernel: audit: type=1006 audit(1747097174.333:1472): pid=5314 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 13 00:46:14.353864 systemd[1]: Started session-17.scope. May 13 00:46:14.333000 audit[5314]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee53db690 a2=3 a3=0 items=0 ppid=1 pid=5314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:14.360010 kernel: audit: type=1300 audit(1747097174.333:1472): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee53db690 a2=3 a3=0 items=0 ppid=1 pid=5314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:14.360053 kernel: audit: type=1327 audit(1747097174.333:1472): proctitle=737368643A20636F7265205B707269765D May 13 00:46:14.333000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:14.361347 kernel: audit: type=1105 audit(1747097174.357:1473): pid=5314 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.357000 audit[5314]: USER_START pid=5314 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.358000 audit[5316]: CRED_ACQ pid=5316 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.368953 kernel: audit: type=1103 audit(1747097174.358:1474): pid=5316 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.500915 sshd[5314]: pam_unix(sshd:session): session closed for user core May 13 00:46:14.501000 audit[5314]: USER_END pid=5314 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.503454 systemd[1]: sshd@16-10.0.0.89:22-10.0.0.1:36128.service: Deactivated successfully. May 13 00:46:14.504153 systemd[1]: session-17.scope: Deactivated successfully. May 13 00:46:14.504684 systemd-logind[1188]: Session 17 logged out. Waiting for processes to exit. May 13 00:46:14.505325 systemd-logind[1188]: Removed session 17. May 13 00:46:14.501000 audit[5314]: CRED_DISP pid=5314 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.515697 kernel: audit: type=1106 audit(1747097174.501:1475): pid=5314 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.515754 kernel: audit: type=1104 audit(1747097174.501:1476): pid=5314 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:14.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.89:22-10.0.0.1:36128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:17.370000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:17.370000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002da6e00 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:46:17.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:46:17.371000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:17.371000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002da6e20 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:46:17.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:46:17.370000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:17.370000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e7ad00 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:46:17.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:46:17.371000 audit[1824]: AVC avc: denied { watch } for pid=1824 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:46:17.371000 audit[1824]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e7ad20 a2=fc6 a3=0 items=0 ppid=1673 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c623,c825 key=(null) May 13 00:46:17.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:46:18.344552 kubelet[1943]: I0513 00:46:18.344485 1943 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:46:18.474000 audit[5333]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=5333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:18.474000 audit[5333]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd1cdbd8f0 a2=0 a3=7ffd1cdbd8dc items=0 ppid=2086 pid=5333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:18.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:18.482000 audit[5333]: NETFILTER_CFG table=nat:123 family=2 entries=34 op=nft_register_chain pid=5333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:18.482000 audit[5333]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd1cdbd8f0 a2=0 a3=7ffd1cdbd8dc items=0 ppid=2086 pid=5333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:18.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:19.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.89:22-10.0.0.1:35590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:19.505573 systemd[1]: Started sshd@17-10.0.0.89:22-10.0.0.1:35590.service. May 13 00:46:19.506734 kernel: kauditd_printk_skb: 19 callbacks suppressed May 13 00:46:19.506805 kernel: audit: type=1130 audit(1747097179.505:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.89:22-10.0.0.1:35590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:19.542000 audit[5341]: USER_ACCT pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.543467 sshd[5341]: Accepted publickey for core from 10.0.0.1 port 35590 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:19.546557 sshd[5341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:19.545000 audit[5341]: CRED_ACQ pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.549922 systemd-logind[1188]: New session 18 of user core. May 13 00:46:19.550691 systemd[1]: Started session-18.scope. May 13 00:46:19.550912 kernel: audit: type=1101 audit(1747097179.542:1485): pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.550944 kernel: audit: type=1103 audit(1747097179.545:1486): pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.550966 kernel: audit: type=1006 audit(1747097179.545:1487): pid=5341 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 13 00:46:19.545000 audit[5341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdc102b00 a2=3 a3=0 items=0 ppid=1 pid=5341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:19.557226 kernel: audit: type=1300 audit(1747097179.545:1487): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdc102b00 a2=3 a3=0 items=0 ppid=1 pid=5341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:19.557268 kernel: audit: type=1327 audit(1747097179.545:1487): proctitle=737368643A20636F7265205B707269765D May 13 00:46:19.545000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:19.554000 audit[5341]: USER_START pid=5341 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.562996 kernel: audit: type=1105 audit(1747097179.554:1488): pid=5341 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.563029 kernel: audit: type=1103 audit(1747097179.555:1489): pid=5343 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.555000 audit[5343]: CRED_ACQ pid=5343 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.651982 sshd[5341]: pam_unix(sshd:session): session closed for user core May 13 00:46:19.652000 audit[5341]: USER_END pid=5341 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.652000 audit[5341]: CRED_DISP pid=5341 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.658912 systemd[1]: sshd@17-10.0.0.89:22-10.0.0.1:35590.service: Deactivated successfully. May 13 00:46:19.659450 systemd[1]: session-18.scope: Deactivated successfully. May 13 00:46:19.660116 systemd-logind[1188]: Session 18 logged out. Waiting for processes to exit. May 13 00:46:19.660894 systemd[1]: Started sshd@18-10.0.0.89:22-10.0.0.1:35606.service. May 13 00:46:19.661032 kernel: audit: type=1106 audit(1747097179.652:1490): pid=5341 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.661090 kernel: audit: type=1104 audit(1747097179.652:1491): pid=5341 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.89:22-10.0.0.1:35590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:19.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.89:22-10.0.0.1:35606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:19.661647 systemd-logind[1188]: Removed session 18. May 13 00:46:19.698000 audit[5354]: USER_ACCT pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.698955 sshd[5354]: Accepted publickey for core from 10.0.0.1 port 35606 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:19.699000 audit[5354]: CRED_ACQ pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.699000 audit[5354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd10aeea90 a2=3 a3=0 items=0 ppid=1 pid=5354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:19.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:19.700189 sshd[5354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:19.703223 systemd-logind[1188]: New session 19 of user core. May 13 00:46:19.704011 systemd[1]: Started session-19.scope. May 13 00:46:19.707000 audit[5354]: USER_START pid=5354 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.708000 audit[5356]: CRED_ACQ pid=5356 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.749022 kubelet[1943]: I0513 00:46:19.748994 1943 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:46:19.842000 audit[5364]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:19.842000 audit[5364]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe125f1900 a2=0 a3=7ffe125f18ec items=0 ppid=2086 pid=5364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:19.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:19.849000 audit[5364]: NETFILTER_CFG table=nat:125 family=2 entries=40 op=nft_register_chain pid=5364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:19.849000 audit[5364]: SYSCALL arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffe125f1900 a2=0 a3=7ffe125f18ec items=0 ppid=2086 pid=5364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:19.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:19.904055 sshd[5354]: pam_unix(sshd:session): session closed for user core May 13 00:46:19.904000 audit[5354]: USER_END pid=5354 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.905000 audit[5354]: CRED_DISP pid=5354 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.907919 systemd[1]: Started sshd@19-10.0.0.89:22-10.0.0.1:35614.service. May 13 00:46:19.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.89:22-10.0.0.1:35614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:19.908457 systemd[1]: sshd@18-10.0.0.89:22-10.0.0.1:35606.service: Deactivated successfully. May 13 00:46:19.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.89:22-10.0.0.1:35606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:19.909223 systemd[1]: session-19.scope: Deactivated successfully. May 13 00:46:19.909727 systemd-logind[1188]: Session 19 logged out. Waiting for processes to exit. May 13 00:46:19.910475 systemd-logind[1188]: Removed session 19. May 13 00:46:19.946000 audit[5366]: USER_ACCT pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.946650 sshd[5366]: Accepted publickey for core from 10.0.0.1 port 35614 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:19.947000 audit[5366]: CRED_ACQ pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.947000 audit[5366]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc60f12fd0 a2=3 a3=0 items=0 ppid=1 pid=5366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:19.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:19.947804 sshd[5366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:19.950892 systemd-logind[1188]: New session 20 of user core. May 13 00:46:19.951675 systemd[1]: Started session-20.scope. May 13 00:46:19.955000 audit[5366]: USER_START pid=5366 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:19.956000 audit[5369]: CRED_ACQ pid=5369 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:20.052000 audit[5377]: NETFILTER_CFG table=filter:126 family=2 entries=8 op=nft_register_rule pid=5377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:20.052000 audit[5377]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff18edf060 a2=0 a3=7fff18edf04c items=0 ppid=2086 pid=5377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:20.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:20.067000 audit[5377]: NETFILTER_CFG table=nat:127 family=2 entries=40 op=nft_unregister_chain pid=5377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:20.067000 audit[5377]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7fff18edf060 a2=0 a3=7fff18edf04c items=0 ppid=2086 pid=5377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:20.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:20.110749 env[1198]: time="2025-05-13T00:46:20.110616903Z" level=info msg="StopContainer for \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\" with timeout 30 (s)" May 13 00:46:20.111500 env[1198]: time="2025-05-13T00:46:20.111458281Z" level=info msg="Stop container \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\" with signal terminated" May 13 00:46:20.122660 systemd[1]: cri-containerd-528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204.scope: Deactivated successfully. May 13 00:46:20.122000 audit: BPF prog-id=185 op=UNLOAD May 13 00:46:20.132000 audit: BPF prog-id=188 op=UNLOAD May 13 00:46:20.143224 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204-rootfs.mount: Deactivated successfully. May 13 00:46:20.227553 env[1198]: time="2025-05-13T00:46:20.227494648Z" level=info msg="shim disconnected" id=528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204 May 13 00:46:20.227553 env[1198]: time="2025-05-13T00:46:20.227547360Z" level=warning msg="cleaning up after shim disconnected" id=528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204 namespace=k8s.io May 13 00:46:20.227553 env[1198]: time="2025-05-13T00:46:20.227558130Z" level=info msg="cleaning up dead shim" May 13 00:46:20.234820 env[1198]: time="2025-05-13T00:46:20.234777776Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:46:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5396 runtime=io.containerd.runc.v2\n" May 13 00:46:20.242350 env[1198]: time="2025-05-13T00:46:20.237938817Z" level=info msg="StopContainer for \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\" returns successfully" May 13 00:46:20.242350 env[1198]: time="2025-05-13T00:46:20.238469597Z" level=info msg="StopPodSandbox for \"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b\"" May 13 00:46:20.242350 env[1198]: time="2025-05-13T00:46:20.238517640Z" level=info msg="Container to stop \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 00:46:20.241204 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b-shm.mount: Deactivated successfully. May 13 00:46:20.248833 systemd[1]: cri-containerd-dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b.scope: Deactivated successfully. May 13 00:46:20.248000 audit: BPF prog-id=174 op=UNLOAD May 13 00:46:20.253000 audit: BPF prog-id=177 op=UNLOAD May 13 00:46:20.267293 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b-rootfs.mount: Deactivated successfully. May 13 00:46:20.268630 env[1198]: time="2025-05-13T00:46:20.268587837Z" level=info msg="shim disconnected" id=dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b May 13 00:46:20.268716 env[1198]: time="2025-05-13T00:46:20.268637934Z" level=warning msg="cleaning up after shim disconnected" id=dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b namespace=k8s.io May 13 00:46:20.268716 env[1198]: time="2025-05-13T00:46:20.268655978Z" level=info msg="cleaning up dead shim" May 13 00:46:20.274868 env[1198]: time="2025-05-13T00:46:20.274832639Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:46:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5427 runtime=io.containerd.runc.v2\n" May 13 00:46:20.326638 systemd-networkd[1023]: cali2310655ab33: Link DOWN May 13 00:46:20.326645 systemd-networkd[1023]: cali2310655ab33: Lost carrier May 13 00:46:20.338000 audit[5469]: NETFILTER_CFG table=filter:128 family=2 entries=52 op=nft_register_rule pid=5469 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:46:20.338000 audit[5469]: SYSCALL arch=c000003e syscall=46 success=yes exit=8960 a0=3 a1=7ffec08a98c0 a2=0 a3=7ffec08a98ac items=0 ppid=3540 pid=5469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:20.338000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:46:20.339000 audit[5469]: NETFILTER_CFG table=filter:129 family=2 entries=2 op=nft_unregister_chain pid=5469 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:46:20.339000 audit[5469]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffec08a98c0 a2=0 a3=559317f61000 items=0 ppid=3540 pid=5469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:20.339000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.325 [INFO][5456] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.325 [INFO][5456] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" iface="eth0" netns="/var/run/netns/cni-0bbc68cc-7f29-4c03-717d-7e638b72dfe5" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.326 [INFO][5456] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" iface="eth0" netns="/var/run/netns/cni-0bbc68cc-7f29-4c03-717d-7e638b72dfe5" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.348 [INFO][5456] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" after=22.219377ms iface="eth0" netns="/var/run/netns/cni-0bbc68cc-7f29-4c03-717d-7e638b72dfe5" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.348 [INFO][5456] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.348 [INFO][5456] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.367 [INFO][5471] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" HandleID="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.367 [INFO][5471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.367 [INFO][5471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.394 [INFO][5471] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" HandleID="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.394 [INFO][5471] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" HandleID="k8s-pod-network.dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" Workload="localhost-k8s-calico--apiserver--58ccc857f4--zx5gj-eth0" May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.395 [INFO][5471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:20.398915 env[1198]: 2025-05-13 00:46:20.397 [INFO][5456] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b" May 13 00:46:20.402049 systemd[1]: run-netns-cni\x2d0bbc68cc\x2d7f29\x2d4c03\x2d717d\x2d7e638b72dfe5.mount: Deactivated successfully. May 13 00:46:20.403241 env[1198]: time="2025-05-13T00:46:20.403203161Z" level=info msg="TearDown network for sandbox \"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b\" successfully" May 13 00:46:20.403241 env[1198]: time="2025-05-13T00:46:20.403236915Z" level=info msg="StopPodSandbox for \"dcd8cf675fa6fc934215d741b04507b6417f11807863635bb5c4fb697d5c9b7b\" returns successfully" May 13 00:46:20.490213 kubelet[1943]: I0513 00:46:20.490167 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-d5xc7\" (UniqueName: \"kubernetes.io/projected/ac679fab-6266-466a-afb9-62d9c95cebb7-kube-api-access-d5xc7\") pod \"ac679fab-6266-466a-afb9-62d9c95cebb7\" (UID: \"ac679fab-6266-466a-afb9-62d9c95cebb7\") " May 13 00:46:20.490718 kubelet[1943]: I0513 00:46:20.490669 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ac679fab-6266-466a-afb9-62d9c95cebb7-calico-apiserver-certs\") pod \"ac679fab-6266-466a-afb9-62d9c95cebb7\" (UID: \"ac679fab-6266-466a-afb9-62d9c95cebb7\") " May 13 00:46:20.493714 kubelet[1943]: I0513 00:46:20.493677 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/ac679fab-6266-466a-afb9-62d9c95cebb7-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "ac679fab-6266-466a-afb9-62d9c95cebb7" (UID: "ac679fab-6266-466a-afb9-62d9c95cebb7"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 13 00:46:20.496153 systemd[1]: var-lib-kubelet-pods-ac679fab\x2d6266\x2d466a\x2dafb9\x2d62d9c95cebb7-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dd5xc7.mount: Deactivated successfully. May 13 00:46:20.496262 systemd[1]: var-lib-kubelet-pods-ac679fab\x2d6266\x2d466a\x2dafb9\x2d62d9c95cebb7-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 13 00:46:20.496436 kubelet[1943]: I0513 00:46:20.496406 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/ac679fab-6266-466a-afb9-62d9c95cebb7-kube-api-access-d5xc7" (OuterVolumeSpecName: "kube-api-access-d5xc7") pod "ac679fab-6266-466a-afb9-62d9c95cebb7" (UID: "ac679fab-6266-466a-afb9-62d9c95cebb7"). InnerVolumeSpecName "kube-api-access-d5xc7". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 00:46:20.591991 kubelet[1943]: I0513 00:46:20.591943 1943 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-d5xc7\" (UniqueName: \"kubernetes.io/projected/ac679fab-6266-466a-afb9-62d9c95cebb7-kube-api-access-d5xc7\") on node \"localhost\" DevicePath \"\"" May 13 00:46:20.591991 kubelet[1943]: I0513 00:46:20.591977 1943 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ac679fab-6266-466a-afb9-62d9c95cebb7-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 13 00:46:21.002000 audit[5485]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:21.002000 audit[5485]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffda94751b0 a2=0 a3=7ffda947519c items=0 ppid=2086 pid=5485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:21.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:21.006000 audit[5485]: NETFILTER_CFG table=nat:131 family=2 entries=36 op=nft_register_rule pid=5485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:21.006000 audit[5485]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffda94751b0 a2=0 a3=7ffda947519c items=0 ppid=2086 pid=5485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:21.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:21.012956 sshd[5366]: pam_unix(sshd:session): session closed for user core May 13 00:46:21.013000 audit[5366]: USER_END pid=5366 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.013000 audit[5366]: CRED_DISP pid=5366 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.015880 systemd[1]: sshd@19-10.0.0.89:22-10.0.0.1:35614.service: Deactivated successfully. May 13 00:46:21.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.89:22-10.0.0.1:35614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:21.016471 systemd[1]: session-20.scope: Deactivated successfully. May 13 00:46:21.018229 systemd-logind[1188]: Session 20 logged out. Waiting for processes to exit. May 13 00:46:21.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.89:22-10.0.0.1:35620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:21.018452 systemd[1]: Started sshd@20-10.0.0.89:22-10.0.0.1:35620.service. May 13 00:46:21.019682 systemd-logind[1188]: Removed session 20. May 13 00:46:21.056000 audit[5488]: USER_ACCT pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.056970 sshd[5488]: Accepted publickey for core from 10.0.0.1 port 35620 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:21.057000 audit[5488]: CRED_ACQ pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.057000 audit[5488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc71f7b6c0 a2=3 a3=0 items=0 ppid=1 pid=5488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:21.057000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:21.057907 sshd[5488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:21.061381 systemd-logind[1188]: New session 21 of user core. May 13 00:46:21.062149 systemd[1]: Started session-21.scope. May 13 00:46:21.064000 audit[5488]: USER_START pid=5488 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.067000 audit[5490]: CRED_ACQ pid=5490 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.112718 kubelet[1943]: I0513 00:46:21.112695 1943 scope.go:117] "RemoveContainer" containerID="528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204" May 13 00:46:21.115286 env[1198]: time="2025-05-13T00:46:21.115252524Z" level=info msg="RemoveContainer for \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\"" May 13 00:46:21.116250 systemd[1]: Removed slice kubepods-besteffort-podac679fab_6266_466a_afb9_62d9c95cebb7.slice. May 13 00:46:21.120613 env[1198]: time="2025-05-13T00:46:21.120577719Z" level=info msg="RemoveContainer for \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\" returns successfully" May 13 00:46:21.120847 kubelet[1943]: I0513 00:46:21.120825 1943 scope.go:117] "RemoveContainer" containerID="528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204" May 13 00:46:21.121102 env[1198]: time="2025-05-13T00:46:21.120987187Z" level=error msg="ContainerStatus for \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\": not found" May 13 00:46:21.121399 kubelet[1943]: E0513 00:46:21.121175 1943 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\": not found" containerID="528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204" May 13 00:46:21.121399 kubelet[1943]: I0513 00:46:21.121199 1943 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204"} err="failed to get container status \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\": rpc error: code = NotFound desc = an error occurred when try to find container \"528e3db8a655f3373281796c33fee6dbfe46582cdc565ff701ab242763c8a204\": not found" May 13 00:46:21.301204 sshd[5488]: pam_unix(sshd:session): session closed for user core May 13 00:46:21.302000 audit[5488]: USER_END pid=5488 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.302000 audit[5488]: CRED_DISP pid=5488 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.305231 systemd[1]: Started sshd@21-10.0.0.89:22-10.0.0.1:35626.service. May 13 00:46:21.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.89:22-10.0.0.1:35626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:21.305722 systemd[1]: sshd@20-10.0.0.89:22-10.0.0.1:35620.service: Deactivated successfully. May 13 00:46:21.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.89:22-10.0.0.1:35620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:21.307416 systemd[1]: session-21.scope: Deactivated successfully. May 13 00:46:21.308405 systemd-logind[1188]: Session 21 logged out. Waiting for processes to exit. May 13 00:46:21.309575 systemd-logind[1188]: Removed session 21. May 13 00:46:21.341000 audit[5498]: USER_ACCT pid=5498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.343498 sshd[5498]: Accepted publickey for core from 10.0.0.1 port 35626 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:21.342000 audit[5498]: CRED_ACQ pid=5498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.342000 audit[5498]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9423c60 a2=3 a3=0 items=0 ppid=1 pid=5498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:21.342000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:21.344617 sshd[5498]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:21.348014 systemd-logind[1188]: New session 22 of user core. May 13 00:46:21.348798 systemd[1]: Started session-22.scope. May 13 00:46:21.350000 audit[5498]: USER_START pid=5498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.352000 audit[5501]: CRED_ACQ pid=5501 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.455381 sshd[5498]: pam_unix(sshd:session): session closed for user core May 13 00:46:21.455000 audit[5498]: USER_END pid=5498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.455000 audit[5498]: CRED_DISP pid=5498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:21.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.89:22-10.0.0.1:35626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:21.458522 systemd[1]: sshd@21-10.0.0.89:22-10.0.0.1:35626.service: Deactivated successfully. May 13 00:46:21.459213 systemd[1]: session-22.scope: Deactivated successfully. May 13 00:46:21.459958 systemd-logind[1188]: Session 22 logged out. Waiting for processes to exit. May 13 00:46:21.460758 systemd-logind[1188]: Removed session 22. May 13 00:46:22.026000 audit[5512]: NETFILTER_CFG table=filter:132 family=2 entries=32 op=nft_register_rule pid=5512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:22.026000 audit[5512]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff3bf0ca70 a2=0 a3=7fff3bf0ca5c items=0 ppid=2086 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:22.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:22.034000 audit[5512]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:22.034000 audit[5512]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff3bf0ca70 a2=0 a3=0 items=0 ppid=2086 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:22.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:22.258576 kubelet[1943]: I0513 00:46:22.258529 1943 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="ac679fab-6266-466a-afb9-62d9c95cebb7" path="/var/lib/kubelet/pods/ac679fab-6266-466a-afb9-62d9c95cebb7/volumes" May 13 00:46:25.022000 audit[5516]: NETFILTER_CFG table=filter:134 family=2 entries=32 op=nft_register_rule pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:25.025471 kernel: kauditd_printk_skb: 79 callbacks suppressed May 13 00:46:25.025544 kernel: audit: type=1325 audit(1747097185.022:1543): table=filter:134 family=2 entries=32 op=nft_register_rule pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:25.022000 audit[5516]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe20a82830 a2=0 a3=7ffe20a8281c items=0 ppid=2086 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:25.033541 kernel: audit: type=1300 audit(1747097185.022:1543): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe20a82830 a2=0 a3=7ffe20a8281c items=0 ppid=2086 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:25.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:25.036240 kernel: audit: type=1327 audit(1747097185.022:1543): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:25.038000 audit[5516]: NETFILTER_CFG table=nat:135 family=2 entries=36 op=nft_register_rule pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:25.038000 audit[5516]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe20a82830 a2=0 a3=7ffe20a8281c items=0 ppid=2086 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:25.047406 kernel: audit: type=1325 audit(1747097185.038:1544): table=nat:135 family=2 entries=36 op=nft_register_rule pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:25.047485 kernel: audit: type=1300 audit(1747097185.038:1544): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe20a82830 a2=0 a3=7ffe20a8281c items=0 ppid=2086 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:25.050222 kernel: audit: type=1327 audit(1747097185.038:1544): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:25.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:26.091680 kubelet[1943]: E0513 00:46:26.091355 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:26.464131 env[1198]: time="2025-05-13T00:46:26.463067871Z" level=info msg="StopContainer for \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\" with timeout 300 (s)" May 13 00:46:26.464131 env[1198]: time="2025-05-13T00:46:26.463530919Z" level=info msg="Stop container \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\" with signal terminated" May 13 00:46:26.465342 systemd[1]: Started sshd@22-10.0.0.89:22-10.0.0.1:44378.service. May 13 00:46:26.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:44378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:26.471403 kernel: audit: type=1130 audit(1747097186.464:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:44378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:26.508000 audit[5553]: NETFILTER_CFG table=filter:136 family=2 entries=32 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:26.508000 audit[5553]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd9b429b70 a2=0 a3=7ffd9b429b5c items=0 ppid=2086 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:26.528528 kernel: audit: type=1325 audit(1747097186.508:1546): table=filter:136 family=2 entries=32 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:26.528715 kernel: audit: type=1300 audit(1747097186.508:1546): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd9b429b70 a2=0 a3=7ffd9b429b5c items=0 ppid=2086 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:26.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:26.531880 kernel: audit: type=1327 audit(1747097186.508:1546): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:26.534000 audit[5553]: NETFILTER_CFG table=nat:137 family=2 entries=30 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:26.534000 audit[5544]: USER_ACCT pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:26.534000 audit[5553]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd9b429b70 a2=0 a3=0 items=0 ppid=2086 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:26.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:26.536846 sshd[5544]: Accepted publickey for core from 10.0.0.1 port 44378 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:26.535000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:26.535000 audit[5544]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc5816980 a2=3 a3=0 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:26.535000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:26.537647 sshd[5544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:26.546289 systemd[1]: Started session-23.scope. May 13 00:46:26.548187 systemd-logind[1188]: New session 23 of user core. May 13 00:46:26.553000 audit[5544]: USER_START pid=5544 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:26.555000 audit[5556]: CRED_ACQ pid=5556 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:26.555000 audit[5555]: NETFILTER_CFG table=filter:138 family=2 entries=32 op=nft_register_rule pid=5555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:26.555000 audit[5555]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff6d2f4170 a2=0 a3=7fff6d2f415c items=0 ppid=2086 pid=5555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:26.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:26.560000 audit[5555]: NETFILTER_CFG table=nat:139 family=2 entries=30 op=nft_register_rule pid=5555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:26.560000 audit[5555]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff6d2f4170 a2=0 a3=0 items=0 ppid=2086 pid=5555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:26.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:26.765861 sshd[5544]: pam_unix(sshd:session): session closed for user core May 13 00:46:26.766000 audit[5544]: USER_END pid=5544 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:26.766000 audit[5544]: CRED_DISP pid=5544 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:26.769659 systemd[1]: sshd@22-10.0.0.89:22-10.0.0.1:44378.service: Deactivated successfully. May 13 00:46:26.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:44378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:26.770902 systemd[1]: session-23.scope: Deactivated successfully. May 13 00:46:26.772536 systemd-logind[1188]: Session 23 logged out. Waiting for processes to exit. May 13 00:46:26.774281 systemd-logind[1188]: Removed session 23. May 13 00:46:26.820097 env[1198]: time="2025-05-13T00:46:26.820026852Z" level=info msg="StopContainer for \"a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d\" with timeout 30 (s)" May 13 00:46:26.820543 env[1198]: time="2025-05-13T00:46:26.820504668Z" level=info msg="Stop container \"a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d\" with signal terminated" May 13 00:46:26.839602 systemd[1]: cri-containerd-a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d.scope: Deactivated successfully. May 13 00:46:26.838000 audit: BPF prog-id=212 op=UNLOAD May 13 00:46:26.847000 audit: BPF prog-id=215 op=UNLOAD May 13 00:46:26.884693 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d-rootfs.mount: Deactivated successfully. May 13 00:46:26.907340 env[1198]: time="2025-05-13T00:46:26.907269720Z" level=info msg="shim disconnected" id=a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d May 13 00:46:26.907340 env[1198]: time="2025-05-13T00:46:26.907340375Z" level=warning msg="cleaning up after shim disconnected" id=a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d namespace=k8s.io May 13 00:46:26.907698 env[1198]: time="2025-05-13T00:46:26.907354112Z" level=info msg="cleaning up dead shim" May 13 00:46:26.918415 env[1198]: time="2025-05-13T00:46:26.917870408Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:46:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5584 runtime=io.containerd.runc.v2\n" May 13 00:46:26.929038 env[1198]: time="2025-05-13T00:46:26.928960184Z" level=info msg="StopContainer for \"a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d\" returns successfully" May 13 00:46:26.930052 env[1198]: time="2025-05-13T00:46:26.929687989Z" level=info msg="StopPodSandbox for \"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463\"" May 13 00:46:26.930052 env[1198]: time="2025-05-13T00:46:26.929761450Z" level=info msg="Container to stop \"a27052567385e9c56cfdccb92c272d05d75a268555a3ec0ad53672738c16a78d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 00:46:26.933930 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463-shm.mount: Deactivated successfully. May 13 00:46:26.940386 systemd[1]: cri-containerd-c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463.scope: Deactivated successfully. May 13 00:46:26.940000 audit: BPF prog-id=200 op=UNLOAD May 13 00:46:26.947000 audit: BPF prog-id=203 op=UNLOAD May 13 00:46:26.974310 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463-rootfs.mount: Deactivated successfully. May 13 00:46:27.042919 env[1198]: time="2025-05-13T00:46:27.041965580Z" level=info msg="shim disconnected" id=c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463 May 13 00:46:27.042919 env[1198]: time="2025-05-13T00:46:27.042027057Z" level=warning msg="cleaning up after shim disconnected" id=c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463 namespace=k8s.io May 13 00:46:27.042919 env[1198]: time="2025-05-13T00:46:27.042040313Z" level=info msg="cleaning up dead shim" May 13 00:46:27.055284 env[1198]: time="2025-05-13T00:46:27.055207908Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:46:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5614 runtime=io.containerd.runc.v2\n" May 13 00:46:27.128486 kubelet[1943]: I0513 00:46:27.128419 1943 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" May 13 00:46:27.153774 systemd-networkd[1023]: cali13cdfee3a33: Link DOWN May 13 00:46:27.153785 systemd-networkd[1023]: cali13cdfee3a33: Lost carrier May 13 00:46:27.182000 audit[5656]: NETFILTER_CFG table=filter:140 family=2 entries=46 op=nft_register_rule pid=5656 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:46:27.182000 audit[5656]: SYSCALL arch=c000003e syscall=46 success=yes exit=7908 a0=3 a1=7ffda4eb8010 a2=0 a3=7ffda4eb7ffc items=0 ppid=3540 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:27.182000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:46:27.183000 audit[5656]: NETFILTER_CFG table=filter:141 family=2 entries=4 op=nft_unregister_chain pid=5656 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:46:27.183000 audit[5656]: SYSCALL arch=c000003e syscall=46 success=yes exit=592 a0=3 a1=7ffda4eb8010 a2=0 a3=561ddae66000 items=0 ppid=3540 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:27.183000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:46:27.257987 kubelet[1943]: E0513 00:46:27.257932 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.152 [INFO][5643] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.152 [INFO][5643] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" iface="eth0" netns="/var/run/netns/cni-1516a39c-f24f-3c39-34d2-a7f67265646f" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.152 [INFO][5643] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" iface="eth0" netns="/var/run/netns/cni-1516a39c-f24f-3c39-34d2-a7f67265646f" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.179 [INFO][5643] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" after=26.54965ms iface="eth0" netns="/var/run/netns/cni-1516a39c-f24f-3c39-34d2-a7f67265646f" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.179 [INFO][5643] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.179 [INFO][5643] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.208 [INFO][5658] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" HandleID="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.208 [INFO][5658] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.208 [INFO][5658] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.362 [INFO][5658] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" HandleID="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.362 [INFO][5658] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" HandleID="k8s-pod-network.c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" Workload="localhost-k8s-calico--kube--controllers--6b8658597f--c8g2s-eth0" May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.365 [INFO][5658] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:27.369509 env[1198]: 2025-05-13 00:46:27.367 [INFO][5643] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463" May 13 00:46:27.370054 env[1198]: time="2025-05-13T00:46:27.369797944Z" level=info msg="TearDown network for sandbox \"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463\" successfully" May 13 00:46:27.370054 env[1198]: time="2025-05-13T00:46:27.369845956Z" level=info msg="StopPodSandbox for \"c6e662658ead4439454cc3bb1af130c671f22fdcded7ed48b7dae0c89562b463\" returns successfully" May 13 00:46:27.374268 systemd[1]: run-netns-cni\x2d1516a39c\x2df24f\x2d3c39\x2d34d2\x2da7f67265646f.mount: Deactivated successfully. May 13 00:46:27.550666 kubelet[1943]: I0513 00:46:27.544643 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53bc8e8a-8278-4145-89d0-64d17addf6bd-tigera-ca-bundle\") pod \"53bc8e8a-8278-4145-89d0-64d17addf6bd\" (UID: \"53bc8e8a-8278-4145-89d0-64d17addf6bd\") " May 13 00:46:27.550666 kubelet[1943]: I0513 00:46:27.544742 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-s8mh9\" (UniqueName: \"kubernetes.io/projected/53bc8e8a-8278-4145-89d0-64d17addf6bd-kube-api-access-s8mh9\") pod \"53bc8e8a-8278-4145-89d0-64d17addf6bd\" (UID: \"53bc8e8a-8278-4145-89d0-64d17addf6bd\") " May 13 00:46:27.558503 systemd[1]: var-lib-kubelet-pods-53bc8e8a\x2d8278\x2d4145\x2d89d0\x2d64d17addf6bd-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. May 13 00:46:27.564448 systemd[1]: var-lib-kubelet-pods-53bc8e8a\x2d8278\x2d4145\x2d89d0\x2d64d17addf6bd-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2ds8mh9.mount: Deactivated successfully. May 13 00:46:27.567195 kubelet[1943]: I0513 00:46:27.567139 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/53bc8e8a-8278-4145-89d0-64d17addf6bd-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "53bc8e8a-8278-4145-89d0-64d17addf6bd" (UID: "53bc8e8a-8278-4145-89d0-64d17addf6bd"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 13 00:46:27.575732 kubelet[1943]: I0513 00:46:27.571478 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/53bc8e8a-8278-4145-89d0-64d17addf6bd-kube-api-access-s8mh9" (OuterVolumeSpecName: "kube-api-access-s8mh9") pod "53bc8e8a-8278-4145-89d0-64d17addf6bd" (UID: "53bc8e8a-8278-4145-89d0-64d17addf6bd"). InnerVolumeSpecName "kube-api-access-s8mh9". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 00:46:27.649275 kubelet[1943]: I0513 00:46:27.645741 1943 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53bc8e8a-8278-4145-89d0-64d17addf6bd-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 13 00:46:27.649275 kubelet[1943]: I0513 00:46:27.645798 1943 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-s8mh9\" (UniqueName: \"kubernetes.io/projected/53bc8e8a-8278-4145-89d0-64d17addf6bd-kube-api-access-s8mh9\") on node \"localhost\" DevicePath \"\"" May 13 00:46:28.140520 systemd[1]: Removed slice kubepods-besteffort-pod53bc8e8a_8278_4145_89d0_64d17addf6bd.slice. May 13 00:46:28.263101 kubelet[1943]: I0513 00:46:28.262595 1943 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="53bc8e8a-8278-4145-89d0-64d17addf6bd" path="/var/lib/kubelet/pods/53bc8e8a-8278-4145-89d0-64d17addf6bd/volumes" May 13 00:46:28.388147 kubelet[1943]: I0513 00:46:28.385310 1943 memory_manager.go:355] "RemoveStaleState removing state" podUID="ac679fab-6266-466a-afb9-62d9c95cebb7" containerName="calico-apiserver" May 13 00:46:28.388147 kubelet[1943]: I0513 00:46:28.385354 1943 memory_manager.go:355] "RemoveStaleState removing state" podUID="53bc8e8a-8278-4145-89d0-64d17addf6bd" containerName="calico-kube-controllers" May 13 00:46:28.400435 systemd[1]: Created slice kubepods-besteffort-podb5ba6c83_5b81_4818_abe0_248fdd8f627b.slice. May 13 00:46:28.459956 kubelet[1943]: I0513 00:46:28.459886 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5ba6c83-5b81-4818-abe0-248fdd8f627b-tigera-ca-bundle\") pod \"calico-kube-controllers-8c758d9b6-v274v\" (UID: \"b5ba6c83-5b81-4818-abe0-248fdd8f627b\") " pod="calico-system/calico-kube-controllers-8c758d9b6-v274v" May 13 00:46:28.459956 kubelet[1943]: I0513 00:46:28.459960 1943 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zrp9g\" (UniqueName: \"kubernetes.io/projected/b5ba6c83-5b81-4818-abe0-248fdd8f627b-kube-api-access-zrp9g\") pod \"calico-kube-controllers-8c758d9b6-v274v\" (UID: \"b5ba6c83-5b81-4818-abe0-248fdd8f627b\") " pod="calico-system/calico-kube-controllers-8c758d9b6-v274v" May 13 00:46:28.715059 env[1198]: time="2025-05-13T00:46:28.714842459Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8c758d9b6-v274v,Uid:b5ba6c83-5b81-4818-abe0-248fdd8f627b,Namespace:calico-system,Attempt:0,}" May 13 00:46:29.189571 systemd-networkd[1023]: cali750ec058684: Link UP May 13 00:46:29.195560 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:46:29.195982 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali750ec058684: link becomes ready May 13 00:46:29.193551 systemd-networkd[1023]: cali750ec058684: Gained carrier May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:28.841 [INFO][5690] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0 calico-kube-controllers-8c758d9b6- calico-system b5ba6c83-5b81-4818-abe0-248fdd8f627b 1308 0 2025-05-13 00:46:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8c758d9b6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-8c758d9b6-v274v eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali750ec058684 [] []}} ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Namespace="calico-system" Pod="calico-kube-controllers-8c758d9b6-v274v" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:28.841 [INFO][5690] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Namespace="calico-system" Pod="calico-kube-controllers-8c758d9b6-v274v" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:28.907 [INFO][5707] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" HandleID="k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Workload="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:28.931 [INFO][5707] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" HandleID="k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Workload="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dccd0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-8c758d9b6-v274v", "timestamp":"2025-05-13 00:46:28.907087634 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:28.931 [INFO][5707] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:28.932 [INFO][5707] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:28.932 [INFO][5707] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:28.955 [INFO][5707] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.031 [INFO][5707] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.057 [INFO][5707] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.060 [INFO][5707] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.075 [INFO][5707] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.075 [INFO][5707] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.081 [INFO][5707] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4 May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.114 [INFO][5707] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.171 [INFO][5707] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.171 [INFO][5707] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" host="localhost" May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.171 [INFO][5707] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:29.236086 env[1198]: 2025-05-13 00:46:29.171 [INFO][5707] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" HandleID="k8s-pod-network.bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Workload="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" May 13 00:46:29.237705 env[1198]: 2025-05-13 00:46:29.177 [INFO][5690] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Namespace="calico-system" Pod="calico-kube-controllers-8c758d9b6-v274v" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0", GenerateName:"calico-kube-controllers-8c758d9b6-", Namespace:"calico-system", SelfLink:"", UID:"b5ba6c83-5b81-4818-abe0-248fdd8f627b", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 46, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8c758d9b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-8c758d9b6-v274v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali750ec058684", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:29.237705 env[1198]: 2025-05-13 00:46:29.177 [INFO][5690] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.136/32] ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Namespace="calico-system" Pod="calico-kube-controllers-8c758d9b6-v274v" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" May 13 00:46:29.237705 env[1198]: 2025-05-13 00:46:29.177 [INFO][5690] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali750ec058684 ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Namespace="calico-system" Pod="calico-kube-controllers-8c758d9b6-v274v" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" May 13 00:46:29.237705 env[1198]: 2025-05-13 00:46:29.193 [INFO][5690] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Namespace="calico-system" Pod="calico-kube-controllers-8c758d9b6-v274v" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" May 13 00:46:29.237705 env[1198]: 2025-05-13 00:46:29.194 [INFO][5690] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Namespace="calico-system" Pod="calico-kube-controllers-8c758d9b6-v274v" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0", GenerateName:"calico-kube-controllers-8c758d9b6-", Namespace:"calico-system", SelfLink:"", UID:"b5ba6c83-5b81-4818-abe0-248fdd8f627b", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 46, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8c758d9b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4", Pod:"calico-kube-controllers-8c758d9b6-v274v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali750ec058684", MAC:"c6:60:cc:68:5c:a3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:46:29.237705 env[1198]: 2025-05-13 00:46:29.231 [INFO][5690] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4" Namespace="calico-system" Pod="calico-kube-controllers-8c758d9b6-v274v" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--8c758d9b6--v274v-eth0" May 13 00:46:29.259000 audit[5727]: NETFILTER_CFG table=filter:142 family=2 entries=50 op=nft_register_chain pid=5727 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:46:29.259000 audit[5727]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffe6ea8c6a0 a2=0 a3=7ffe6ea8c68c items=0 ppid=3540 pid=5727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.259000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:46:29.283540 env[1198]: time="2025-05-13T00:46:29.281320081Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:46:29.283540 env[1198]: time="2025-05-13T00:46:29.281436615Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:46:29.283540 env[1198]: time="2025-05-13T00:46:29.281471982Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:46:29.283958 env[1198]: time="2025-05-13T00:46:29.283899077Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4 pid=5735 runtime=io.containerd.runc.v2 May 13 00:46:29.331250 systemd[1]: Started cri-containerd-bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4.scope. May 13 00:46:29.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.346000 audit: BPF prog-id=216 op=LOAD May 13 00:46:29.347000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5735 pid=5745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663966303833653465613161363039366537353866646636613431 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5735 pid=5745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663966303833653465613161363039366537353866646636613431 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.347000 audit: BPF prog-id=217 op=LOAD May 13 00:46:29.347000 audit[5745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e2cf0 items=0 ppid=5735 pid=5745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663966303833653465613161363039366537353866646636613431 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.350000 audit: BPF prog-id=218 op=LOAD May 13 00:46:29.350000 audit[5745]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e2d38 items=0 ppid=5735 pid=5745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663966303833653465613161363039366537353866646636613431 May 13 00:46:29.353000 audit: BPF prog-id=218 op=UNLOAD May 13 00:46:29.353000 audit: BPF prog-id=217 op=UNLOAD May 13 00:46:29.353000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { perfmon } for pid=5745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit[5745]: AVC avc: denied { bpf } for pid=5745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.353000 audit: BPF prog-id=219 op=LOAD May 13 00:46:29.353000 audit[5745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e3148 items=0 ppid=5735 pid=5745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663966303833653465613161363039366537353866646636613431 May 13 00:46:29.358203 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:46:29.417628 env[1198]: time="2025-05-13T00:46:29.417547100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8c758d9b6-v274v,Uid:b5ba6c83-5b81-4818-abe0-248fdd8f627b,Namespace:calico-system,Attempt:0,} returns sandbox id \"bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4\"" May 13 00:46:29.438242 env[1198]: time="2025-05-13T00:46:29.438114952Z" level=info msg="CreateContainer within sandbox \"bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:46:29.471162 env[1198]: time="2025-05-13T00:46:29.470867152Z" level=info msg="CreateContainer within sandbox \"bdf9f083e4ea1a6096e758fdf6a41258799bd0f713df9a05a7bfcd5bc4a04cf4\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5df0a4d08a80064b56a6d9c48bab9d7c67e0788774362b3287056282cd7f05c5\"" May 13 00:46:29.473521 env[1198]: time="2025-05-13T00:46:29.472029246Z" level=info msg="StartContainer for \"5df0a4d08a80064b56a6d9c48bab9d7c67e0788774362b3287056282cd7f05c5\"" May 13 00:46:29.505043 systemd[1]: Started cri-containerd-5df0a4d08a80064b56a6d9c48bab9d7c67e0788774362b3287056282cd7f05c5.scope. May 13 00:46:29.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.530000 audit: BPF prog-id=220 op=LOAD May 13 00:46:29.531000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5735 pid=5777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564663061346430386138303036346235366136643963343862616239 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=5735 pid=5777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564663061346430386138303036346235366136643963343862616239 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.531000 audit: BPF prog-id=221 op=LOAD May 13 00:46:29.531000 audit[5777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ac040 items=0 ppid=5735 pid=5777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564663061346430386138303036346235366136643963343862616239 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit: BPF prog-id=222 op=LOAD May 13 00:46:29.533000 audit[5777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003ac088 items=0 ppid=5735 pid=5777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564663061346430386138303036346235366136643963343862616239 May 13 00:46:29.533000 audit: BPF prog-id=222 op=UNLOAD May 13 00:46:29.533000 audit: BPF prog-id=221 op=UNLOAD May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { perfmon } for pid=5777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit[5777]: AVC avc: denied { bpf } for pid=5777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:29.533000 audit: BPF prog-id=223 op=LOAD May 13 00:46:29.533000 audit[5777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ac498 items=0 ppid=5735 pid=5777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:29.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564663061346430386138303036346235366136643963343862616239 May 13 00:46:29.592136 env[1198]: time="2025-05-13T00:46:29.592061291Z" level=info msg="StartContainer for \"5df0a4d08a80064b56a6d9c48bab9d7c67e0788774362b3287056282cd7f05c5\" returns successfully" May 13 00:46:30.205079 systemd[1]: run-containerd-runc-k8s.io-5df0a4d08a80064b56a6d9c48bab9d7c67e0788774362b3287056282cd7f05c5-runc.jYz4D2.mount: Deactivated successfully. May 13 00:46:30.229848 kubelet[1943]: I0513 00:46:30.228305 1943 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-8c758d9b6-v274v" podStartSLOduration=2.228278753 podStartE2EDuration="2.228278753s" podCreationTimestamp="2025-05-13 00:46:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:46:30.223387747 +0000 UTC m=+78.058787164" watchObservedRunningTime="2025-05-13 00:46:30.228278753 +0000 UTC m=+78.063678170" May 13 00:46:30.258260 kubelet[1943]: E0513 00:46:30.258142 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:30.527825 systemd-networkd[1023]: cali750ec058684: Gained IPv6LL May 13 00:46:31.027423 systemd[1]: cri-containerd-4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71.scope: Deactivated successfully. May 13 00:46:31.039904 kernel: kauditd_printk_skb: 146 callbacks suppressed May 13 00:46:31.040041 kernel: audit: type=1334 audit(1747097191.026:1601): prog-id=126 op=UNLOAD May 13 00:46:31.026000 audit: BPF prog-id=126 op=UNLOAD May 13 00:46:31.067589 kernel: audit: type=1334 audit(1747097191.053:1602): prog-id=129 op=UNLOAD May 13 00:46:31.067751 kernel: audit: type=1325 audit(1747097191.056:1603): table=filter:143 family=2 entries=20 op=nft_register_rule pid=5873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:31.053000 audit: BPF prog-id=129 op=UNLOAD May 13 00:46:31.056000 audit[5873]: NETFILTER_CFG table=filter:143 family=2 entries=20 op=nft_register_rule pid=5873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:31.077601 kernel: audit: type=1300 audit(1747097191.056:1603): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffffceda4f0 a2=0 a3=7ffffceda4dc items=0 ppid=2086 pid=5873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:31.056000 audit[5873]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffffceda4f0 a2=0 a3=7ffffceda4dc items=0 ppid=2086 pid=5873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:31.084863 kernel: audit: type=1327 audit(1747097191.056:1603): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:31.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:31.088000 audit[5873]: NETFILTER_CFG table=nat:144 family=2 entries=106 op=nft_register_chain pid=5873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:31.088000 audit[5873]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffffceda4f0 a2=0 a3=7ffffceda4dc items=0 ppid=2086 pid=5873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:31.105074 kernel: audit: type=1325 audit(1747097191.088:1604): table=nat:144 family=2 entries=106 op=nft_register_chain pid=5873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:31.105207 kernel: audit: type=1300 audit(1747097191.088:1604): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffffceda4f0 a2=0 a3=7ffffceda4dc items=0 ppid=2086 pid=5873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:31.105261 kernel: audit: type=1327 audit(1747097191.088:1604): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:31.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:31.121323 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71-rootfs.mount: Deactivated successfully. May 13 00:46:31.126704 env[1198]: time="2025-05-13T00:46:31.126644115Z" level=info msg="shim disconnected" id=4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71 May 13 00:46:31.127170 env[1198]: time="2025-05-13T00:46:31.127143710Z" level=warning msg="cleaning up after shim disconnected" id=4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71 namespace=k8s.io May 13 00:46:31.127261 env[1198]: time="2025-05-13T00:46:31.127238492Z" level=info msg="cleaning up dead shim" May 13 00:46:31.143848 env[1198]: time="2025-05-13T00:46:31.143787493Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:46:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5887 runtime=io.containerd.runc.v2\n" May 13 00:46:31.207826 env[1198]: time="2025-05-13T00:46:31.206027645Z" level=info msg="StopContainer for \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\" returns successfully" May 13 00:46:31.211233 env[1198]: time="2025-05-13T00:46:31.208354795Z" level=info msg="StopPodSandbox for \"06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e\"" May 13 00:46:31.211233 env[1198]: time="2025-05-13T00:46:31.208460467Z" level=info msg="Container to stop \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 00:46:31.212061 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e-shm.mount: Deactivated successfully. May 13 00:46:31.222000 audit: BPF prog-id=118 op=UNLOAD May 13 00:46:31.223931 systemd[1]: cri-containerd-06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e.scope: Deactivated successfully. May 13 00:46:31.227471 kernel: audit: type=1334 audit(1747097191.222:1605): prog-id=118 op=UNLOAD May 13 00:46:31.240000 audit: BPF prog-id=121 op=UNLOAD May 13 00:46:31.244395 kernel: audit: type=1334 audit(1747097191.240:1606): prog-id=121 op=UNLOAD May 13 00:46:31.294863 env[1198]: time="2025-05-13T00:46:31.294744089Z" level=info msg="shim disconnected" id=06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e May 13 00:46:31.295072 env[1198]: time="2025-05-13T00:46:31.295047389Z" level=warning msg="cleaning up after shim disconnected" id=06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e namespace=k8s.io May 13 00:46:31.295161 env[1198]: time="2025-05-13T00:46:31.295140056Z" level=info msg="cleaning up dead shim" May 13 00:46:31.304006 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e-rootfs.mount: Deactivated successfully. May 13 00:46:31.326817 env[1198]: time="2025-05-13T00:46:31.326763751Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:46:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5917 runtime=io.containerd.runc.v2\n" May 13 00:46:31.374574 env[1198]: time="2025-05-13T00:46:31.374409629Z" level=info msg="TearDown network for sandbox \"06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e\" successfully" May 13 00:46:31.374574 env[1198]: time="2025-05-13T00:46:31.374474113Z" level=info msg="StopPodSandbox for \"06d47733403ec4c1d51fac388f72b7118cbcf6b8858e2db19dce772026b8996e\" returns successfully" May 13 00:46:31.420586 kubelet[1943]: I0513 00:46:31.420506 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/889418f4-9958-4967-ac20-f4e859b90a1f-typha-certs\") pod \"889418f4-9958-4967-ac20-f4e859b90a1f\" (UID: \"889418f4-9958-4967-ac20-f4e859b90a1f\") " May 13 00:46:31.420586 kubelet[1943]: I0513 00:46:31.420578 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/889418f4-9958-4967-ac20-f4e859b90a1f-tigera-ca-bundle\") pod \"889418f4-9958-4967-ac20-f4e859b90a1f\" (UID: \"889418f4-9958-4967-ac20-f4e859b90a1f\") " May 13 00:46:31.421188 kubelet[1943]: I0513 00:46:31.420643 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-rsmb2\" (UniqueName: \"kubernetes.io/projected/889418f4-9958-4967-ac20-f4e859b90a1f-kube-api-access-rsmb2\") pod \"889418f4-9958-4967-ac20-f4e859b90a1f\" (UID: \"889418f4-9958-4967-ac20-f4e859b90a1f\") " May 13 00:46:31.429009 systemd[1]: var-lib-kubelet-pods-889418f4\x2d9958\x2d4967\x2dac20\x2df4e859b90a1f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2drsmb2.mount: Deactivated successfully. May 13 00:46:31.433623 kubelet[1943]: I0513 00:46:31.433506 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/889418f4-9958-4967-ac20-f4e859b90a1f-kube-api-access-rsmb2" (OuterVolumeSpecName: "kube-api-access-rsmb2") pod "889418f4-9958-4967-ac20-f4e859b90a1f" (UID: "889418f4-9958-4967-ac20-f4e859b90a1f"). InnerVolumeSpecName "kube-api-access-rsmb2". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 00:46:31.439327 systemd[1]: var-lib-kubelet-pods-889418f4\x2d9958\x2d4967\x2dac20\x2df4e859b90a1f-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 13 00:46:31.451570 kubelet[1943]: I0513 00:46:31.451490 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/889418f4-9958-4967-ac20-f4e859b90a1f-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "889418f4-9958-4967-ac20-f4e859b90a1f" (UID: "889418f4-9958-4967-ac20-f4e859b90a1f"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 13 00:46:31.452098 kubelet[1943]: I0513 00:46:31.452053 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/889418f4-9958-4967-ac20-f4e859b90a1f-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "889418f4-9958-4967-ac20-f4e859b90a1f" (UID: "889418f4-9958-4967-ac20-f4e859b90a1f"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 13 00:46:31.470000 audit[5934]: NETFILTER_CFG table=filter:145 family=2 entries=9 op=nft_register_rule pid=5934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:31.470000 audit[5934]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff7cf75ec0 a2=0 a3=7fff7cf75eac items=0 ppid=2086 pid=5934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:31.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:31.480000 audit[5934]: NETFILTER_CFG table=nat:146 family=2 entries=51 op=nft_unregister_chain pid=5934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:31.480000 audit[5934]: SYSCALL arch=c000003e syscall=46 success=yes exit=15244 a0=3 a1=7fff7cf75ec0 a2=0 a3=7fff7cf75eac items=0 ppid=2086 pid=5934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:31.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:31.521922 kubelet[1943]: I0513 00:46:31.521872 1943 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/889418f4-9958-4967-ac20-f4e859b90a1f-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 13 00:46:31.522192 kubelet[1943]: I0513 00:46:31.522167 1943 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-rsmb2\" (UniqueName: \"kubernetes.io/projected/889418f4-9958-4967-ac20-f4e859b90a1f-kube-api-access-rsmb2\") on node \"localhost\" DevicePath \"\"" May 13 00:46:31.522300 kubelet[1943]: I0513 00:46:31.522282 1943 reconciler_common.go:299] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/889418f4-9958-4967-ac20-f4e859b90a1f-typha-certs\") on node \"localhost\" DevicePath \"\"" May 13 00:46:31.791739 systemd[1]: Started sshd@23-10.0.0.89:22-10.0.0.1:44390.service. May 13 00:46:31.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.89:22-10.0.0.1:44390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:31.850000 audit[5936]: USER_ACCT pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:31.852003 sshd[5936]: Accepted publickey for core from 10.0.0.1 port 44390 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:31.851000 audit[5936]: CRED_ACQ pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:31.851000 audit[5936]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce6f7a580 a2=3 a3=0 items=0 ppid=1 pid=5936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:31.851000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:31.853344 sshd[5936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:31.866639 systemd[1]: Started session-24.scope. May 13 00:46:31.868052 systemd-logind[1188]: New session 24 of user core. May 13 00:46:31.896000 audit[5936]: USER_START pid=5936 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:31.900000 audit[5946]: CRED_ACQ pid=5946 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:31.944865 env[1198]: time="2025-05-13T00:46:31.941818775Z" level=info msg="StopContainer for \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\" with timeout 30 (s)" May 13 00:46:31.944865 env[1198]: time="2025-05-13T00:46:31.942306508Z" level=info msg="Stop container \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\" with signal terminated" May 13 00:46:31.974000 audit: BPF prog-id=178 op=UNLOAD May 13 00:46:31.975476 systemd[1]: cri-containerd-b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25.scope: Deactivated successfully. May 13 00:46:31.980000 audit: BPF prog-id=181 op=UNLOAD May 13 00:46:32.014418 env[1198]: time="2025-05-13T00:46:32.014197923Z" level=info msg="shim disconnected" id=b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25 May 13 00:46:32.014418 env[1198]: time="2025-05-13T00:46:32.014259150Z" level=warning msg="cleaning up after shim disconnected" id=b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25 namespace=k8s.io May 13 00:46:32.014418 env[1198]: time="2025-05-13T00:46:32.014270982Z" level=info msg="cleaning up dead shim" May 13 00:46:32.028667 env[1198]: time="2025-05-13T00:46:32.028604946Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:46:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5983 runtime=io.containerd.runc.v2\n" May 13 00:46:32.077033 env[1198]: time="2025-05-13T00:46:32.076906327Z" level=info msg="StopContainer for \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\" returns successfully" May 13 00:46:32.078336 env[1198]: time="2025-05-13T00:46:32.077851232Z" level=info msg="StopPodSandbox for \"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71\"" May 13 00:46:32.078336 env[1198]: time="2025-05-13T00:46:32.077921266Z" level=info msg="Container to stop \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 00:46:32.091892 systemd[1]: cri-containerd-0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71.scope: Deactivated successfully. May 13 00:46:32.089000 audit: BPF prog-id=151 op=UNLOAD May 13 00:46:32.096000 audit: BPF prog-id=154 op=UNLOAD May 13 00:46:32.125407 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25-rootfs.mount: Deactivated successfully. May 13 00:46:32.125569 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71-shm.mount: Deactivated successfully. May 13 00:46:32.125708 systemd[1]: var-lib-kubelet-pods-889418f4\x2d9958\x2d4967\x2dac20\x2df4e859b90a1f-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 13 00:46:32.144132 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71-rootfs.mount: Deactivated successfully. May 13 00:46:32.147350 sshd[5936]: pam_unix(sshd:session): session closed for user core May 13 00:46:32.149717 env[1198]: time="2025-05-13T00:46:32.149618850Z" level=info msg="shim disconnected" id=0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71 May 13 00:46:32.149717 env[1198]: time="2025-05-13T00:46:32.149701628Z" level=warning msg="cleaning up after shim disconnected" id=0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71 namespace=k8s.io May 13 00:46:32.149717 env[1198]: time="2025-05-13T00:46:32.149716366Z" level=info msg="cleaning up dead shim" May 13 00:46:32.152000 audit[5936]: USER_END pid=5936 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:32.152000 audit[5936]: CRED_DISP pid=5936 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:32.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.89:22-10.0.0.1:44390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:32.155573 systemd[1]: sshd@23-10.0.0.89:22-10.0.0.1:44390.service: Deactivated successfully. May 13 00:46:32.156562 systemd[1]: session-24.scope: Deactivated successfully. May 13 00:46:32.159861 systemd-logind[1188]: Session 24 logged out. Waiting for processes to exit. May 13 00:46:32.164317 systemd-logind[1188]: Removed session 24. May 13 00:46:32.167564 kubelet[1943]: I0513 00:46:32.166675 1943 scope.go:117] "RemoveContainer" containerID="4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71" May 13 00:46:32.175751 env[1198]: time="2025-05-13T00:46:32.171904920Z" level=info msg="RemoveContainer for \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\"" May 13 00:46:32.175751 env[1198]: time="2025-05-13T00:46:32.173587807Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:46:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6014 runtime=io.containerd.runc.v2\n" May 13 00:46:32.181253 systemd[1]: Removed slice kubepods-besteffort-pod889418f4_9958_4967_ac20_f4e859b90a1f.slice. May 13 00:46:32.208581 env[1198]: time="2025-05-13T00:46:32.207909500Z" level=info msg="RemoveContainer for \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\" returns successfully" May 13 00:46:32.209244 kubelet[1943]: I0513 00:46:32.208258 1943 scope.go:117] "RemoveContainer" containerID="4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71" May 13 00:46:32.213774 env[1198]: time="2025-05-13T00:46:32.212119205Z" level=error msg="ContainerStatus for \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\": not found" May 13 00:46:32.213938 kubelet[1943]: E0513 00:46:32.212656 1943 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\": not found" containerID="4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71" May 13 00:46:32.213938 kubelet[1943]: I0513 00:46:32.212708 1943 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71"} err="failed to get container status \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\": rpc error: code = NotFound desc = an error occurred when try to find container \"4379136c36b0ab2db0d10a71b60412eb2347cebda5e904fd223ce200a030af71\": not found" May 13 00:46:32.262695 kubelet[1943]: I0513 00:46:32.261565 1943 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="889418f4-9958-4967-ac20-f4e859b90a1f" path="/var/lib/kubelet/pods/889418f4-9958-4967-ac20-f4e859b90a1f/volumes" May 13 00:46:32.320355 systemd-networkd[1023]: cali62ff2a22767: Link DOWN May 13 00:46:32.320797 systemd-networkd[1023]: cali62ff2a22767: Lost carrier May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.314 [INFO][6044] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.316 [INFO][6044] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" iface="eth0" netns="/var/run/netns/cni-a1a588dc-87de-5a9b-40bf-4ee7ef842334" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.317 [INFO][6044] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" iface="eth0" netns="/var/run/netns/cni-a1a588dc-87de-5a9b-40bf-4ee7ef842334" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.354 [INFO][6044] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" after=37.595219ms iface="eth0" netns="/var/run/netns/cni-a1a588dc-87de-5a9b-40bf-4ee7ef842334" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.354 [INFO][6044] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.354 [INFO][6044] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.389 [INFO][6054] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" HandleID="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.389 [INFO][6054] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.389 [INFO][6054] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.491 [INFO][6054] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" HandleID="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.492 [INFO][6054] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" HandleID="k8s-pod-network.0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" Workload="localhost-k8s-calico--apiserver--58ccc857f4--5zdsn-eth0" May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.496 [INFO][6054] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:46:32.502782 env[1198]: 2025-05-13 00:46:32.498 [INFO][6044] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71" May 13 00:46:32.504622 systemd[1]: run-netns-cni\x2da1a588dc\x2d87de\x2d5a9b\x2d40bf\x2d4ee7ef842334.mount: Deactivated successfully. May 13 00:46:32.508015 env[1198]: time="2025-05-13T00:46:32.506481159Z" level=info msg="TearDown network for sandbox \"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71\" successfully" May 13 00:46:32.508015 env[1198]: time="2025-05-13T00:46:32.506530884Z" level=info msg="StopPodSandbox for \"0a6adadb40d1cde63fde62aeebed5a9a4f4dfc5205b8c716fbd8731a993b2f71\" returns successfully" May 13 00:46:32.510000 audit[6065]: NETFILTER_CFG table=filter:147 family=2 entries=10 op=nft_register_rule pid=6065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:32.510000 audit[6065]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe4bf805b0 a2=0 a3=7ffe4bf8059c items=0 ppid=2086 pid=6065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:32.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:32.514000 audit[6065]: NETFILTER_CFG table=nat:148 family=2 entries=60 op=nft_register_chain pid=6065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:32.514000 audit[6065]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7ffe4bf805b0 a2=0 a3=7ffe4bf8059c items=0 ppid=2086 pid=6065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:32.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:32.653767 kubelet[1943]: I0513 00:46:32.650913 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/087c8e13-074f-4fde-b3bf-565afc56de3e-calico-apiserver-certs\") pod \"087c8e13-074f-4fde-b3bf-565afc56de3e\" (UID: \"087c8e13-074f-4fde-b3bf-565afc56de3e\") " May 13 00:46:32.653767 kubelet[1943]: I0513 00:46:32.651339 1943 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-mzp2d\" (UniqueName: \"kubernetes.io/projected/087c8e13-074f-4fde-b3bf-565afc56de3e-kube-api-access-mzp2d\") pod \"087c8e13-074f-4fde-b3bf-565afc56de3e\" (UID: \"087c8e13-074f-4fde-b3bf-565afc56de3e\") " May 13 00:46:32.666460 systemd[1]: var-lib-kubelet-pods-087c8e13\x2d074f\x2d4fde\x2db3bf\x2d565afc56de3e-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dmzp2d.mount: Deactivated successfully. May 13 00:46:32.677560 kubelet[1943]: I0513 00:46:32.667620 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/087c8e13-074f-4fde-b3bf-565afc56de3e-kube-api-access-mzp2d" (OuterVolumeSpecName: "kube-api-access-mzp2d") pod "087c8e13-074f-4fde-b3bf-565afc56de3e" (UID: "087c8e13-074f-4fde-b3bf-565afc56de3e"). InnerVolumeSpecName "kube-api-access-mzp2d". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 00:46:32.677560 kubelet[1943]: I0513 00:46:32.672861 1943 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/087c8e13-074f-4fde-b3bf-565afc56de3e-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "087c8e13-074f-4fde-b3bf-565afc56de3e" (UID: "087c8e13-074f-4fde-b3bf-565afc56de3e"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 13 00:46:32.678157 systemd[1]: var-lib-kubelet-pods-087c8e13\x2d074f\x2d4fde\x2db3bf\x2d565afc56de3e-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 13 00:46:32.757076 kubelet[1943]: I0513 00:46:32.756939 1943 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/087c8e13-074f-4fde-b3bf-565afc56de3e-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 13 00:46:32.757310 kubelet[1943]: I0513 00:46:32.757293 1943 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-mzp2d\" (UniqueName: \"kubernetes.io/projected/087c8e13-074f-4fde-b3bf-565afc56de3e-kube-api-access-mzp2d\") on node \"localhost\" DevicePath \"\"" May 13 00:46:33.183736 kubelet[1943]: I0513 00:46:33.183705 1943 scope.go:117] "RemoveContainer" containerID="b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25" May 13 00:46:33.188847 systemd[1]: Removed slice kubepods-besteffort-pod087c8e13_074f_4fde_b3bf_565afc56de3e.slice. May 13 00:46:33.194402 env[1198]: time="2025-05-13T00:46:33.193244564Z" level=info msg="RemoveContainer for \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\"" May 13 00:46:33.203300 env[1198]: time="2025-05-13T00:46:33.203242162Z" level=info msg="RemoveContainer for \"b6585d2810b4adcdb1942131f75f34956b874d7f8320ab714aaf919c68bb7d25\" returns successfully" May 13 00:46:33.537000 audit[6099]: NETFILTER_CFG table=filter:149 family=2 entries=10 op=nft_register_rule pid=6099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:33.537000 audit[6099]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe99fbcda0 a2=0 a3=7ffe99fbcd8c items=0 ppid=2086 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:33.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:33.559000 audit[6099]: NETFILTER_CFG table=nat:150 family=2 entries=58 op=nft_register_rule pid=6099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:33.559000 audit[6099]: SYSCALL arch=c000003e syscall=46 success=yes exit=19684 a0=3 a1=7ffe99fbcda0 a2=0 a3=7ffe99fbcd8c items=0 ppid=2086 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:33.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:34.262808 kubelet[1943]: I0513 00:46:34.260975 1943 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="087c8e13-074f-4fde-b3bf-565afc56de3e" path="/var/lib/kubelet/pods/087c8e13-074f-4fde-b3bf-565afc56de3e/volumes" May 13 00:46:35.096000 audit[6123]: NETFILTER_CFG table=filter:151 family=2 entries=9 op=nft_register_rule pid=6123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:35.096000 audit[6123]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdb0dba2c0 a2=0 a3=7ffdb0dba2ac items=0 ppid=2086 pid=6123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:35.096000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:35.112000 audit[6123]: NETFILTER_CFG table=nat:152 family=2 entries=51 op=nft_register_chain pid=6123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:46:35.112000 audit[6123]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffdb0dba2c0 a2=0 a3=7ffdb0dba2ac items=0 ppid=2086 pid=6123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:35.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:46:35.257997 kubelet[1943]: E0513 00:46:35.257191 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:36.043000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.045598 kernel: kauditd_printk_skb: 39 callbacks suppressed May 13 00:46:36.045711 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.043000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.053456 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.053588 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.043000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.043000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.061649 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.061805 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.043000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.043000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.070268 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.043000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.078580 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.078761 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.043000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.082951 kernel: audit: type=1400 audit(1747097196.043:1628): avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.043000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.084468 kernel: audit: type=1334 audit(1747097196.043:1628): prog-id=224 op=LOAD May 13 00:46:36.043000 audit: BPF prog-id=224 op=LOAD May 13 00:46:36.043000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbd7b3730 a2=98 a3=3 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.043000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.052000 audit: BPF prog-id=224 op=UNLOAD May 13 00:46:36.052000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.052000 audit: BPF prog-id=225 op=LOAD May 13 00:46:36.052000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbd7b3510 a2=74 a3=540051 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.056000 audit: BPF prog-id=225 op=UNLOAD May 13 00:46:36.056000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.056000 audit: BPF prog-id=226 op=LOAD May 13 00:46:36.056000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbd7b3540 a2=94 a3=2 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.064000 audit: BPF prog-id=226 op=UNLOAD May 13 00:46:36.190000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.190000 audit: BPF prog-id=227 op=LOAD May 13 00:46:36.190000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbd7b3400 a2=40 a3=1 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.190000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.191000 audit: BPF prog-id=227 op=UNLOAD May 13 00:46:36.191000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.191000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcbd7b34d0 a2=50 a3=7ffcbd7b35b0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.191000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbd7b3410 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd7b3440 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd7b3350 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbd7b3460 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbd7b3440 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbd7b3430 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbd7b3460 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd7b3440 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd7b3460 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbd7b3430 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.198000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.198000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbd7b34a0 a2=28 a3=0 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.198000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbd7b3250 a2=50 a3=1 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.199000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit: BPF prog-id=228 op=LOAD May 13 00:46:36.199000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbd7b3250 a2=94 a3=5 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.199000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.199000 audit: BPF prog-id=228 op=UNLOAD May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbd7b3300 a2=50 a3=1 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.199000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcbd7b3420 a2=4 a3=38 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.199000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { confidentiality } for pid=6163 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:46:36.199000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbd7b3470 a2=94 a3=6 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.199000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { confidentiality } for pid=6163 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:46:36.199000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbd7b2c20 a2=94 a3=83 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.199000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.199000 audit[6163]: AVC avc: denied { confidentiality } for pid=6163 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:46:36.199000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbd7b2c20 a2=94 a3=83 items=0 ppid=6147 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.199000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit: BPF prog-id=229 op=LOAD May 13 00:46:36.200000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc102772e0 a2=98 a3=3 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.200000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.200000 audit: BPF prog-id=229 op=UNLOAD May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit: BPF prog-id=230 op=LOAD May 13 00:46:36.200000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc102770c0 a2=74 a3=540051 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.200000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.200000 audit: BPF prog-id=230 op=UNLOAD May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.200000 audit: BPF prog-id=231 op=LOAD May 13 00:46:36.200000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc102770f0 a2=94 a3=2 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.200000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.201000 audit: BPF prog-id=231 op=UNLOAD May 13 00:46:36.315000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.315000 audit: BPF prog-id=232 op=LOAD May 13 00:46:36.315000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc10276fb0 a2=40 a3=1 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.315000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.316000 audit: BPF prog-id=232 op=UNLOAD May 13 00:46:36.316000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.316000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc10277080 a2=50 a3=7ffc10277160 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.316000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc10276fc0 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc10276ff0 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc10276f00 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc10277010 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc10276ff0 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc10276fe0 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc10277010 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc10276ff0 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc10277010 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc10276fe0 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.324000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.324000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc10277050 a2=28 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.324000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc10276e00 a2=50 a3=1 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.325000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit: BPF prog-id=233 op=LOAD May 13 00:46:36.325000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc10276e00 a2=94 a3=5 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.325000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.325000 audit: BPF prog-id=233 op=UNLOAD May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc10276eb0 a2=50 a3=1 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.325000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc10276fd0 a2=4 a3=38 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.325000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { confidentiality } for pid=6164 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:46:36.325000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc10277020 a2=94 a3=6 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.325000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { confidentiality } for pid=6164 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:46:36.325000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc102767d0 a2=94 a3=83 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.325000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { perfmon } for pid=6164 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: AVC avc: denied { confidentiality } for pid=6164 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:46:36.325000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc102767d0 a2=94 a3=83 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.325000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.325000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.325000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.325000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=3d items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=43 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=45 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=49 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=4f items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=51 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=52 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=53 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=54 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=55 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=56 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=57 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=58 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=59 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=5a items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=5b items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=5c items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=5d items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=5e items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=5f items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=60 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=61 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=62 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=63 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=64 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=65 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=66 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=67 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=6a items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=6d items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=6e items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=71 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=72 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=75 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.326000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.326000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=7a items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.326000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=7d items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=8a items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=8f items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=92 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=9b items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=9e items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=aa items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=ad items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=b8 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=bf items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=c0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=c3 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=c4 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=c7 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=cc items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=cf items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=d0 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=d3 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=d8 items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=db items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.327000 audit[6164]: AVC avc: denied { bpf } for pid=6164 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.327000 audit[6164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc10278210 a2=10 a3=dc items=0 ppid=6147 pid=6164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit: BPF prog-id=234 op=LOAD May 13 00:46:36.342000 audit[6174]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffecc0b8a70 a2=98 a3=1999999999999999 items=0 ppid=6147 pid=6174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.342000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:46:36.342000 audit: BPF prog-id=234 op=UNLOAD May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit: BPF prog-id=235 op=LOAD May 13 00:46:36.342000 audit[6174]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffecc0b8950 a2=74 a3=ffff items=0 ppid=6147 pid=6174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.342000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:46:36.342000 audit: BPF prog-id=235 op=UNLOAD May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { perfmon } for pid=6174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit[6174]: AVC avc: denied { bpf } for pid=6174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:46:36.342000 audit: BPF prog-id=236 op=LOAD May 13 00:46:36.342000 audit[6174]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffecc0b8990 a2=40 a3=7ffecc0b8b70 items=0 ppid=6147 pid=6174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:36.342000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:46:36.342000 audit: BPF prog-id=236 op=UNLOAD May 13 00:46:37.148114 systemd[1]: Started sshd@24-10.0.0.89:22-10.0.0.1:45744.service. May 13 00:46:37.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.89:22-10.0.0.1:45744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:37.198000 audit[6202]: USER_ACCT pid=6202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:37.200505 sshd[6202]: Accepted publickey for core from 10.0.0.1 port 45744 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:37.200000 audit[6202]: CRED_ACQ pid=6202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:37.200000 audit[6202]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4edffc50 a2=3 a3=0 items=0 ppid=1 pid=6202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:37.200000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:37.202615 sshd[6202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:37.217538 systemd-logind[1188]: New session 25 of user core. May 13 00:46:37.218706 systemd[1]: Started session-25.scope. May 13 00:46:37.229000 audit[6202]: USER_START pid=6202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:37.231000 audit[6204]: CRED_ACQ pid=6204 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:37.376214 sshd[6202]: pam_unix(sshd:session): session closed for user core May 13 00:46:37.380000 audit[6202]: USER_END pid=6202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:37.380000 audit[6202]: CRED_DISP pid=6202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:37.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.89:22-10.0.0.1:45744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:37.384545 systemd[1]: sshd@24-10.0.0.89:22-10.0.0.1:45744.service: Deactivated successfully. May 13 00:46:37.385512 systemd[1]: session-25.scope: Deactivated successfully. May 13 00:46:37.386651 systemd-logind[1188]: Session 25 logged out. Waiting for processes to exit. May 13 00:46:37.388798 systemd-logind[1188]: Removed session 25. May 13 00:46:42.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.89:22-10.0.0.1:45756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:42.386717 systemd[1]: Started sshd@25-10.0.0.89:22-10.0.0.1:45756.service. May 13 00:46:42.393827 kernel: kauditd_printk_skb: 509 callbacks suppressed May 13 00:46:42.393972 kernel: audit: type=1130 audit(1747097202.389:1756): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.89:22-10.0.0.1:45756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:42.449000 audit[6313]: USER_ACCT pid=6313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.451087 sshd[6313]: Accepted publickey for core from 10.0.0.1 port 45756 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:42.461797 kernel: audit: type=1101 audit(1747097202.449:1757): pid=6313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.461978 kernel: audit: type=1103 audit(1747097202.460:1758): pid=6313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.460000 audit[6313]: CRED_ACQ pid=6313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.461761 sshd[6313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:42.475502 kernel: audit: type=1006 audit(1747097202.460:1759): pid=6313 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 13 00:46:42.460000 audit[6313]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca533f570 a2=3 a3=0 items=0 ppid=1 pid=6313 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:42.478975 systemd[1]: Started session-26.scope. May 13 00:46:42.480489 systemd-logind[1188]: New session 26 of user core. May 13 00:46:42.486796 kernel: audit: type=1300 audit(1747097202.460:1759): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca533f570 a2=3 a3=0 items=0 ppid=1 pid=6313 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:42.486943 kernel: audit: type=1327 audit(1747097202.460:1759): proctitle=737368643A20636F7265205B707269765D May 13 00:46:42.460000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:42.487000 audit[6313]: USER_START pid=6313 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.487000 audit[6322]: CRED_ACQ pid=6322 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.506183 kernel: audit: type=1105 audit(1747097202.487:1760): pid=6313 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.506354 kernel: audit: type=1103 audit(1747097202.487:1761): pid=6322 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.747598 sshd[6313]: pam_unix(sshd:session): session closed for user core May 13 00:46:42.746000 audit[6313]: USER_END pid=6313 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.750762 systemd[1]: sshd@25-10.0.0.89:22-10.0.0.1:45756.service: Deactivated successfully. May 13 00:46:42.751716 systemd[1]: session-26.scope: Deactivated successfully. May 13 00:46:42.746000 audit[6313]: CRED_DISP pid=6313 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.756914 systemd-logind[1188]: Session 26 logged out. Waiting for processes to exit. May 13 00:46:42.758033 systemd-logind[1188]: Removed session 26. May 13 00:46:42.765287 kernel: audit: type=1106 audit(1747097202.746:1762): pid=6313 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.765401 kernel: audit: type=1104 audit(1747097202.746:1763): pid=6313 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:42.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.89:22-10.0.0.1:45756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:43.257473 kubelet[1943]: E0513 00:46:43.257428 1943 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:46:47.752020 systemd[1]: Started sshd@26-10.0.0.89:22-10.0.0.1:40370.service. May 13 00:46:47.754583 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:46:47.754630 kernel: audit: type=1130 audit(1747097207.751:1765): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.89:22-10.0.0.1:40370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:47.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.89:22-10.0.0.1:40370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:47.789000 audit[6436]: USER_ACCT pid=6436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.789645 sshd[6436]: Accepted publickey for core from 10.0.0.1 port 40370 ssh2: RSA SHA256:rB6W9bZE2VLaM16OfY/13txyT/mKzB4zHBxc/zNPaeA May 13 00:46:47.793000 audit[6436]: CRED_ACQ pid=6436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.794429 sshd[6436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:46:47.798276 kernel: audit: type=1101 audit(1747097207.789:1766): pid=6436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.798405 kernel: audit: type=1103 audit(1747097207.793:1767): pid=6436 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.798429 kernel: audit: type=1006 audit(1747097207.793:1768): pid=6436 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 13 00:46:47.797974 systemd-logind[1188]: New session 27 of user core. May 13 00:46:47.798674 systemd[1]: Started session-27.scope. May 13 00:46:47.793000 audit[6436]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9cfbe310 a2=3 a3=0 items=0 ppid=1 pid=6436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:47.805063 kernel: audit: type=1300 audit(1747097207.793:1768): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9cfbe310 a2=3 a3=0 items=0 ppid=1 pid=6436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:47.805115 kernel: audit: type=1327 audit(1747097207.793:1768): proctitle=737368643A20636F7265205B707269765D May 13 00:46:47.793000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:46:47.806501 kernel: audit: type=1105 audit(1747097207.802:1769): pid=6436 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.802000 audit[6436]: USER_START pid=6436 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.803000 audit[6438]: CRED_ACQ pid=6438 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.814383 kernel: audit: type=1103 audit(1747097207.803:1770): pid=6438 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.902527 sshd[6436]: pam_unix(sshd:session): session closed for user core May 13 00:46:47.902000 audit[6436]: USER_END pid=6436 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.904809 systemd[1]: sshd@26-10.0.0.89:22-10.0.0.1:40370.service: Deactivated successfully. May 13 00:46:47.905489 systemd[1]: session-27.scope: Deactivated successfully. May 13 00:46:47.905973 systemd-logind[1188]: Session 27 logged out. Waiting for processes to exit. May 13 00:46:47.906605 systemd-logind[1188]: Removed session 27. May 13 00:46:47.903000 audit[6436]: CRED_DISP pid=6436 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.913594 kernel: audit: type=1106 audit(1747097207.902:1771): pid=6436 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.913648 kernel: audit: type=1104 audit(1747097207.903:1772): pid=6436 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:46:47.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.89:22-10.0.0.1:40370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'